Mobile Devices Evolution and Revolution: A Cause for Security Concern

نویسنده

  • Abdullah Al-Zakwani
چکیده

Today’s mobile phones are considered as fashion gadgets, communication devices, personal organisers and are rapidly moving toward becoming personal computers. The devices, networks and operating systems are getting ever sophisticated, while the price of devices and network connection is falling rapidly. This has increased the span of mobile users and ability to explore the limitation of the devices for the hackers and crackers. The current authentication mechanism and lack of security tools (such as the lack of good antivirus) should be considered critically and measures should be put in place for the near future. The paper looks at development in mobile technology and revises mobile industry improvements, with regards to security implications and attempts to provide some solutions. Keyword: Mobile devices, security, GSM, Bluetooth technology, authentication and Agents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security

Mobile security draws more attention when mobile devices gain its popularity. Malware such as viruses, botnets, worms become a concern of using mobile devices since they leak sensitive information stored at or transmitted by mobile devices. This paper investigates malware in different platforms of mobile devices including Bluetooth, iPhone OS, and Blackberry. Countermeasures of vulnerability an...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Connection Interface Designing for Grid and Mobile Devices

There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...

متن کامل

Antibacterial Susceptibility Pattern of the Pseudomonas aeruginosa and Staphylococcus aureus after Exposure to Electromagnetic Waves Emitted from Mobile Phone Simulator

Background: The increasing use of telecommunication devices such as Wi-Fi modems and mobile phones in the recent years can change the cellular structure of microorganisms so the generation of electromagnetic waves has led to concern in the community whenever be exposed to these fields and may have harmful effects on human health.Material and Methods: Standard strains of bacteria were prepared o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006