Mobile Terminal Security

نویسندگان

  • Olivier Benoît
  • Nora Dabbous
  • Laurent Gauteron
  • Pierre Girard
  • Helena Handschuh
  • David Naccache
  • Stéphane Socié
  • Claire Whelan
چکیده

The miniaturization of electronics and recent developments in biometric and screen technologies will permit a pervasive presence of embedded systems. This and the inclusion of networking capabilities and IP addresses in many handheld devices will foster the widespread deployment of personal mobile equipment. As mobile devices proliferate and their diversity grows, it is surprising to discover how few are appropriately secured against the risks associated with potential sensitive date exposure. Mobile equipment fulfills a steadily growing variety of functions: holding personal data, interacting with other devices in local environment, communicating with remote systems, representing the person by making decisions, and processing data according to pre-established policies or by means of auto-learning procedures, to name a few. From a software design perspective, modern mobile devices are real miniature computers embarking advanced software components linker, a loader, a Java virtual machine, remote method invocation modules, a bytecode verifier, a garbage collector, cryptographic libraries, a complex protocol stack plus numerous other specialized software and hardware components (e.g. a digital camera, a biometric sensor, wireless modems etc.). Consequently, mobile devices need essentially the same types of security measures as entreprise networks – access control, user authentication, data encryption, a firewall, intrusion prevention and protection from malicious code. However, the fundamental security difference inherent to mobile devices is the lack of physical access control. Mobile devices are designed for use outside the physical confines of the office or factory. Consequently, handheld devices and smart phones are often used precisely where

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-Singular Terminal Sliding Mode Control of a Nonholonomic Wheeled Mobile Robots Using Fuzzy Based Tyre Force Estimator

This paper, proposes a methodology to implement a suitable nonsingular terminal sliding mode controller associated with the output feedback control to achieve a successful trajectory tracking of a non-holonomic wheeled mobile robot in presence of longitudinal and lateral slip accompanied. This implementation offers a relatively faster and high precision tracking performance. We investigate this...

متن کامل

Research on Data Synchronization Technology of Mobile Database Based on Real-time Embedded System

Design the technologies for data acquisition of embedded mobile terminal, data transmission and synchronization of embedded mobile terminal and the server and establishment and maintenance of the server database. Solve the shortcomings as difficulty in data acquisition of data synchronization, complicated operation of equipment, large amount of data, data error and lost in the process of transm...

متن کامل

Abnormal IP Packets on 3G Mobile Data Networks

As the mobile Internet has become widespread in recent years, communication based on mobile networks is increasing. As a result, security threats have been posed with regard to the abnormal traffic of mobile networks, but mobile security has been handled with focus on threats posed by mobile malicious codes, and researches on security threats to the mobile network itself have not attracted much...

متن کامل

A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service

As information technology environment gets based on mobile, cloud, BYOD, mobile terminal just used for communication in the past is changed to support e-commerce and mobile office using the internet. However, threat of tap and information leak due to terminal loss, theft or infection of malware occurs. Corporations are strengthening access control and security through attaching sticker to a sma...

متن کامل

A Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment

— Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004