Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Demanding Requirement of Security for Wireless Mobile Devices: A Survey

K. Muthumanickam and E. Ilavarasan
Department of Computer Science and Engineering, Pondicherry Engineering College, Puducherry-605014, India
Research Journal of Applied Sciences, Engineering and Technology  2014  24:2381-2387
http://dx.doi.org/10.19026/rjaset.8.1244  |  © The Author(s) 2014
Received: June ‎08, ‎2014  |  Accepted: July ‎19, ‎2014  |  Published: December 25, 2014

Abstract

Today, the technology advancement in telecommunication facilitates users to bear portable devices with convenient and timely accessing to their personal and business data on the fly. In this regard, mobile and ubiquitous devices become part of the user’s personal or business growing. Recently, the usage of portable devices has drastically amplified due to wireless data technologies such as GPRS, GSM, Bluetooth, WI-Fi and WiMAX. As the use of wireless portable devices increases, the risks associated with them also increases. Specifically Android Smart- phone which can access the Internet may now signify an ultimate option for malware authors. As the core open communication mediocre, the Airwave, is susceptible, there has been a rise of a security technique suggested by researchers. When comparing to security measures proposed to protect wireless devices, protecting mobile vulnerabilities is still immature. So in this study, we present an organized and widespread overview of the research on the security elucidation for wireless portable devices. This survey study discusses the security risks imposed by vulnerabilities, threats and security measures in the recent past, mainly spotlighting on complex attacks to user applications. We classify existing countermeasures at guarding wireless mobile devices facing different kinds of attacks into various groups; depend on the revealing technique, collected information and operating systems. In the next phase we will design and implement new security model to protect mobile phone resources against unknown vulnerabilities.

Keywords:

IDS, mobile threats, security, WiFi-AP,


References

  1. Becher, M. and F.C. Freiling, 2008. Towards dynamic malware analysis to increase mobile device security. Sicherheit, 128: 423-433.
  2. Becher, M., F.C. Freiling, J. Hoffmann, T. Holz, S. Vellenbeck and C. Wolf, 2011. Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. Proceeding of the 2011 IEEE Symposium on Security and Privacy (SP), pp: 96-111.
    CrossRef    
  3. Bickford, J., P. O'Hare, A. Bliga, V. Gnapathy and L. Iftode, 2010. Rootkits on smart phones: Attacks, implications and opportunities. Proceeding of the 11th Workshop on Mobile Computing Systems and Applications, pp: 49-54.
    CrossRef    
  4. Corporation, S., 2014. Symantec internet security threat report 2014. Vol. 19, 2014.
  5. Damopoulos, D., S.A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke and S. Gritzalis, 2012. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Lect. Notes Comput. Sc., 5(1): 3-14.
    CrossRef    
  6. Gartner Research, 2013. Gartner Says Smart Phone Sales Accounted for 55 Percent of Overall Mobile Phones in Third Quarter of 2013.
    Direct Link
  7. Ho, Y.L. and S.H. Heng, 2009. Mobile and ubiquitous malware. Proceeding of the 7th International Conference on Advances in Mobile Computing and Multimedia (MOMM '09). ACM, USA, pp: 559-563.
    CrossRef    
  8. Hyppoene, M., 2010. Mobile security review september 2010. Helsinki Finland Technical Report, F-Secure Labs, September 2010.
  9. Hypponen, M., 2006. Malware goes mobile. Sci. Am., 295(5): 46-53.https://doi.org/10.1038/scientificamerican1106-70
    CrossRef    
  10. ITU Statistics, 2014.Retrieved from: http://www.itu.int/ict/statistics.
    Direct Link
  11. Jacoby, G.A., R. Machany and N.J.D. Iv, 2006. How mobile host batteries can improve network security. IEEE Secur. Priv., 4: 40-49.
    CrossRef    
  12. Juniper Networks, 2011. Malicious mobile threats report 2010/2011. Technical Report, Juniper Networks Inc.
  13. Kaskersky Lab, 2010. Popular Porn Sites Distribute a New Trojan Targeting Android Smart Phones.Retrieved from: http://www.kaspersky.com/news? Id=207576175.
    Direct Link
  14. Kotadia, M., 2007. Major Smartphone Worm by 2007: Gartner Study. June 2005.Retrieved from: Media.kaspersky.com/pdf/KSB-2013-EN.pdf.
    Direct Link
  15. Lawton, G., 2008. Is it finally time to worry about mobile malware? Computer, 41: 12-14. https://doi.org/10.1109/MC.2008.159
    CrossRef    
  16. Leavitt, N., 2000. Malicious code moves to mobile devices. Computer, 33: 16-19. https://doi.org/10.1109/MC.2000.841780
    CrossRef    
  17. Milliken, J., S. Valerio and M. Alan, 2013. Detection and analysis of the chameleon WiFi access point virus. Eurasip J. Inform. Secur., 2013: 1-14.
    CrossRef    
  18. Mulliner, C.R., 2006. Security of smart phones. M.A. Thesis, University of California.
  19. Oberheide, J. and F. Jahanian, 2010. When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. Proceeding of the 11th Workshop on Mobile Computing Systems. ACM, USA, pp: 43-48.
    CrossRef    
  20. Oberheide, J., K. Veeraraghavan, E. Cooke, J. Flinn and F. Jahanian, 2008. Virtualized in-cloud security services for mobile devices. Proceeding of the 1st Workshop on Virtualization in Mobile Computing. ACM, USA, pp: 31-35.
    CrossRef    
  21. Ortega Juan, A., F. David, A.A. Juan, G.A. Luis and V. Francisco, 2011. A novel approach to Trojan horse detection in mobile phones messaging and bluetooth services. KSII T. Internet Inform. Syst., 5(8): 1457.
    CrossRef    
  22. Portokalidis, G., P. Homburg, N. FitzRoy-Dale, K. Anagnostakis and H. Bos, 2009. Protecting smart phones by means of execution replication. Tech. Report, Vrijie Universite, Amsterdam.
  23. Shabtai, A., U. Kanonov, Y. Elovici, C. Glezer and Y. Weiss, 2011. Andromaly: A behavioral malware detection framework for android devices. J. Intell. Inform. Syst., 38: 161-190.
    CrossRef    
  24. Toyssy, S. and H. Helenius, 2006. About malicious software in smart phones. J. Comput. Virol., 12(2): 109-119.
    CrossRef    
  25. Trend Micro, 2012. Retrieved from: http://countermeasures.trendmicro.eu/wp-content/uploads/2012/02/History-of-Mobile-Malware.pdf.
    Direct Link
  26. Yan, G., S. Eidenbenz and E. Galli, 2009. SMS-watchdog: Protecting social behaviors of SMS users for anomaly detection. Proceeding of the 12th Symposium on Recent Advances in Intrusion Detection, pp: 202-223.
    CrossRef    PMCid:PMC2702005    
  27. Zahid, S., M. Shahzad, S. Khayam and M. Farooq, 2009. Keystroke-based user identification on smart phones. Lect. Notes Cpmput. Sc., 5758: 224-243.
    CrossRef    
  28. Zhu, Z., G. Cao, S. Zhu, S. Ranjan and A. Nucci, 2009. A social network based patching scheme for worm containment in cellular networks. Proceeding of the IFOCOM 2009, pp: 1476-1484.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved