Mobile Devices Evolution and Revolution: A Cause for Security Concern
نویسنده
چکیده
Today’s mobile phones are considered as fashion gadgets, communication devices, personal organisers and are rapidly moving toward becoming personal computers. The devices, networks and operating systems are getting ever sophisticated, while the price of devices and network connection is falling rapidly. This has increased the span of mobile users and ability to explore the limitation of the devices for the hackers and crackers. The current authentication mechanism and lack of security tools (such as the lack of good antivirus) should be considered critically and measures should be put in place for the near future. The paper looks at development in mobile technology and revises mobile industry improvements, with regards to security implications and attempts to provide some solutions. Keyword: Mobile devices, security, GSM, Bluetooth technology, authentication and Agents.
منابع مشابه
Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security
Mobile security draws more attention when mobile devices gain its popularity. Malware such as viruses, botnets, worms become a concern of using mobile devices since they leak sensitive information stored at or transmitted by mobile devices. This paper investigates malware in different platforms of mobile devices including Bluetooth, iPhone OS, and Blackberry. Countermeasures of vulnerability an...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کاملAntibacterial Susceptibility Pattern of the Pseudomonas aeruginosa and Staphylococcus aureus after Exposure to Electromagnetic Waves Emitted from Mobile Phone Simulator
Background: The increasing use of telecommunication devices such as Wi-Fi modems and mobile phones in the recent years can change the cellular structure of microorganisms so the generation of electromagnetic waves has led to concern in the community whenever be exposed to these fields and may have harmful effects on human health.Material and Methods: Standard strains of bacteria were prepared o...
متن کامل