Research Article | OPEN ACCESS
Demanding Requirement of Security for Wireless Mobile Devices: A Survey
K. Muthumanickam and E. Ilavarasan
Department of Computer Science and Engineering, Pondicherry Engineering College,
Puducherry-605014, India
Research Journal of Applied Sciences, Engineering and Technology 2014 24:2381-2387
Received: June ‎08, ‎2014 | Accepted: July ‎19, ‎2014 | Published: December 25, 2014
Abstract
Today, the technology advancement in telecommunication facilitates users to bear portable devices with convenient and timely accessing to their personal and business data on the fly. In this regard, mobile and ubiquitous devices become part of the user’s personal or business growing. Recently, the usage of portable devices has drastically amplified due to wireless data technologies such as GPRS, GSM, Bluetooth, WI-Fi and WiMAX. As the use of wireless portable devices increases, the risks associated with them also increases. Specifically Android Smart- phone which can access the Internet may now signify an ultimate option for malware authors. As the core open communication mediocre, the Airwave, is susceptible, there has been a rise of a security technique suggested by researchers. When comparing to security measures proposed to protect wireless devices, protecting mobile vulnerabilities is still immature. So in this study, we present an organized and widespread overview of the research on the security elucidation for wireless portable devices. This survey study discusses the security risks imposed by vulnerabilities, threats and security measures in the recent past, mainly spotlighting on complex attacks to user applications. We classify existing countermeasures at guarding wireless mobile devices facing different kinds of attacks into various groups; depend on the revealing technique, collected information and operating systems. In the next phase we will design and implement new security model to protect mobile phone resources against unknown vulnerabilities.
Keywords:
IDS, mobile threats, security, WiFi-AP,
References
-
Becher, M. and F.C. Freiling, 2008. Towards dynamic malware analysis to increase mobile device security. Sicherheit, 128: 423-433.
-
Becher, M., F.C. Freiling, J. Hoffmann, T. Holz, S. Vellenbeck and C. Wolf, 2011. Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. Proceeding of the 2011 IEEE Symposium on Security and Privacy (SP), pp: 96-111.
CrossRef
-
Bickford, J., P. O'Hare, A. Bliga, V. Gnapathy and L. Iftode, 2010. Rootkits on smart phones: Attacks, implications and opportunities. Proceeding of the 11th Workshop on Mobile Computing Systems and Applications, pp: 49-54.
CrossRef
-
Corporation, S., 2014. Symantec internet security threat report 2014. Vol. 19, 2014.
-
Damopoulos, D., S.A. Menesidou, G. Kambourakis, M. Papadaki, N. Clarke and S. Gritzalis, 2012. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Lect. Notes Comput. Sc., 5(1): 3-14.
CrossRef
-
Gartner Research, 2013. Gartner Says Smart Phone Sales Accounted for 55 Percent of Overall Mobile Phones in Third Quarter of 2013.
Direct Link
-
Ho, Y.L. and S.H. Heng, 2009. Mobile and ubiquitous malware. Proceeding of the 7th International Conference on Advances in Mobile Computing and Multimedia (MOMM '09). ACM, USA, pp: 559-563.
CrossRef -
Hyppoene, M., 2010. Mobile security review september 2010. Helsinki Finland Technical Report, F-Secure Labs, September 2010.
-
Hypponen, M., 2006. Malware goes mobile. Sci. Am., 295(5): 46-53.https://doi.org/10.1038/scientificamerican1106-70
CrossRef
-
ITU Statistics, 2014.Retrieved from: http://www.itu.int/ict/statistics.
Direct Link
-
Jacoby, G.A., R. Machany and N.J.D. Iv, 2006. How mobile host batteries can improve network security. IEEE Secur. Priv., 4: 40-49.
CrossRef
-
Juniper Networks, 2011. Malicious mobile threats report 2010/2011. Technical Report, Juniper Networks Inc.
-
Kaskersky Lab, 2010. Popular Porn Sites Distribute a New Trojan Targeting Android Smart Phones.Retrieved from: http://www.kaspersky.com/news? Id=207576175.
Direct Link
-
Kotadia, M., 2007. Major Smartphone Worm by 2007: Gartner Study. June 2005.Retrieved from: Media.kaspersky.com/pdf/KSB-2013-EN.pdf.
Direct Link
-
Lawton, G., 2008. Is it finally time to worry about mobile malware? Computer, 41: 12-14. https://doi.org/10.1109/MC.2008.159
CrossRef
-
Leavitt, N., 2000. Malicious code moves to mobile devices. Computer, 33: 16-19. https://doi.org/10.1109/MC.2000.841780
CrossRef
-
Milliken, J., S. Valerio and M. Alan, 2013. Detection and analysis of the chameleon WiFi access point virus. Eurasip J. Inform. Secur., 2013: 1-14.
CrossRef
-
Mulliner, C.R., 2006. Security of smart phones. M.A. Thesis, University of California.
-
Oberheide, J. and F. Jahanian, 2010. When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. Proceeding of the 11th Workshop on Mobile Computing Systems. ACM, USA, pp: 43-48.
CrossRef
-
Oberheide, J., K. Veeraraghavan, E. Cooke, J. Flinn and F. Jahanian, 2008. Virtualized in-cloud security services for mobile devices. Proceeding of the 1st Workshop on Virtualization in Mobile Computing. ACM, USA, pp: 31-35.
CrossRef
-
Ortega Juan, A., F. David, A.A. Juan, G.A. Luis and V. Francisco, 2011. A novel approach to Trojan horse detection in mobile phones messaging and bluetooth services. KSII T. Internet Inform. Syst., 5(8): 1457.
CrossRef
-
Portokalidis, G., P. Homburg, N. FitzRoy-Dale, K. Anagnostakis and H. Bos, 2009. Protecting smart phones by means of execution replication. Tech. Report, Vrijie Universite, Amsterdam.
-
Shabtai, A., U. Kanonov, Y. Elovici, C. Glezer and Y. Weiss, 2011. Andromaly: A behavioral malware detection framework for android devices. J. Intell. Inform. Syst., 38: 161-190.
CrossRef
-
Toyssy, S. and H. Helenius, 2006. About malicious software in smart phones. J. Comput. Virol., 12(2): 109-119.
CrossRef
-
Trend Micro, 2012. Retrieved from: http://countermeasures.trendmicro.eu/wp-content/uploads/2012/02/History-of-Mobile-Malware.pdf.
Direct Link
-
Yan, G., S. Eidenbenz and E. Galli, 2009. SMS-watchdog: Protecting social behaviors of SMS users for anomaly detection. Proceeding of the 12th Symposium on Recent Advances in Intrusion Detection, pp: 202-223.
CrossRef PMCid:PMC2702005
-
Zahid, S., M. Shahzad, S. Khayam and M. Farooq, 2009. Keystroke-based user identification on smart phones. Lect. Notes Cpmput. Sc., 5758: 224-243.
CrossRef
-
Zhu, Z., G. Cao, S. Zhu, S. Ranjan and A. Nucci, 2009. A social network based patching scheme for worm containment in cellular networks. Proceeding of the IFOCOM 2009, pp: 1476-1484.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|