Wireless and Mobile Computing Security Challenges and Their Possible Solutions

Authors

  • Mohammad Othman Nassar

Keywords:

Mobile, Security, security challenges

Abstract

Mobile device security has become more critical as businesses begin to rely on these devices for everyday processes. Securing information from unauthorized access is a major problem for any network, especially in the wireless networks. This paper will discuss the main security challenges concerning the mobile devices such as tablet and cell phones which run a mobile Operating System (OS). More specifically, these are Android (Google), iOS (Apple), or BlackBerry OS (RIM). Major solutions to the security challenges will also presented and discussed in this paper.

References

N. Leavitt, "Mobile security: Finally a serious problem," Computer, vol. 6, no. 44, pp. 11-14, 2011.

“The Three Tenents of Cyber Security,” n.d.. [Online]. Available: http://www.spi.dod.mil/tenets.htm. [Accessed 1 January 2012].

T. Blitz, "Decoding mobile device security," Security, vol. 5, no. 42, pp. 46-47, 2005.

Google Mobile Blog, “Android and Security,” 2 February 2012. [Online]. Available: http://googlemobile.blogspot.com/2012/02/android-andsecurity.html. [Accessed 1 January 2012].

S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.

Swiderski, F., and Snyde, W.: Threat Modeling. Microsoft Press, (2004).

Myagmar, S., and Yurcik, W.: Why Johnny Can Hack: The Mismatch Between Vulnerabili-ties and Security Protection Standards. IEEE International Symposium on Secure Software Engineering (ISSSE), McLean, March (2006).

C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.

D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.

GAO-12-757,” INFORMATION SECURITY: Better Implementation of Controls for Mobile Devices Should Be Encouraged”,2012,[Online]. Available : http://www.gao.gov/648519.pdf

” McAfee Labs 2012 Threats Predictions ”, [Online].Available:http://blogs.mcafee.com/consumer/mcafee-labs- 2012-threats-predictions.

Sophos, “Security Threat Report,” 2010. [Online].Available: http://www.sophos.com/sophos/docs/eng/ papers/sophos-security-threat-report-jan-2010-wpna.pdf

”Security solutions available and proposed”,2012.[Online] Available: http://www.zdnet.com/search?q=security+solutions+available+and+proposed.

P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks,” Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, 2002, pp. 27-31.

P. Michiardi and R. Molva, “Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks,” Research Report RR-02-063, Institute Eurecom, 2002.

] S. Buchegger and J. Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks,” Proceedings of 10th Euromicro Workshop on Parallel, Distributed and Networkbased Processing, Canary Islands, 2002, pp. 403-410.

S. Funfrocken, “Protecting Mobile Web-Commerce Agents with Smartcards,” Proceedings of the 1st International Symposium on Agent Systems and Applications, Palm Springs, California, 1999, pp. 90-102.

Downloads

Published

2013-05-05

How to Cite

Nassar, M. O. . (2013). Wireless and Mobile Computing Security Challenges and Their Possible Solutions. American Scientific Research Journal for Engineering, Technology, and Sciences, 3(1), 66–74. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/3296