Abstract
Today, Smartphone device uses are increasing day-by-day such as email, gaming, Internet banking, which requires it to always remain connected with Wi-Fi. This makes it vulnerable to numerous attacks. In this paper, we explore different Smartphone vulnerabilities, malwares, and security challenges. In addition, we also present a classification of various security solutions proposed in the literature. It provides better understanding about current security issues and challenges in Smartphone Wi-Fi access channel, current solution space, and future research direction to protect it from variety of DDoS attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dondyk, E., Rivera, L., Zou, C.C.: Wi–Fi access denial of service attack to smartphone. Int. J. Secur. Netw. 8(3), 117–129 (2013)
Wang, Y., Streff, K., Raman, S.: Smartphone security challenges, pp. 52–58 (2012)
Leavitt, N.: Mobile security: finally a serious problem? Computer 11–14 (2011)
Gupta, B.B., Joshi, R.C., Misra, M., Meena, D.L., Shrivastava, G., Sharma, K.: Detecting a wide range of flooding DDoS attacks using linear prediction model. In: IEEE 2nd International Conference on Information and Multimedia Technology (ICIMT 2010), vol. 2, pp. 535–539 (2010)
Li, B., Im, E.G.: Smartphone, promising battlefield for hackers. J. Secur. Eng. 8(1), 89–110 (2011)
Shrivastava, G., Sharma, K., Rai, S.: The detection & defense of DoS & DDos attack: a technical overview. In: International Conference on Computer Engineering and Technology, pp. 274–282, 2010
Wei, T.-E., Mao, C.-H., Jeng, A.B., Lee, H.-M., Wang, H.-T., Wu, D.-J.: Android malware detection via latent network behavior analysis. In: The 2012 International Symposium on Advances in Trusted and Secure Information Systems (TSIS 2012), Liverpool, UK, pp. 1251–1258 (2012)
Husted, N., Saïdi, H., Gehani, A.: Smartphone security limitations: conflicting traditions. In: Proceedings of 2011 Workshop on Governance of Technology, Information, and Policies, ACM, pp. 5–12 (2011)
La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446–471 (2013, First Quarter)
Hadiks, A., et al.: A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 507–508. IEEE (2014)
Ramu, S.: Mobile malware evolution, detection and defence. Term Survey Paper, April 2012. http://blogs.ubc.ca/computersecurity/files/2012/04/SRamu_EECE572_SurveyPaper-SrikanthRamu.pdf
Mancinelli, D.: Public Wi-fi: Friend or Foe?, pp. 1–9 (2014)
Feng, J.L.R., Gong, G.: Vulnerability Analysis and Countermeasures for Wi-Fi-based Location Services and Applications, pp. 1–12 (2014)
Patil, S., Vanjale, S.: A survey on malicious access point detection methods for wireless local area network. Int. J. Comput. Sci. Eng. 2, 22–25 (2014)
Zheng, X., et al. Accurate rogue access point localization leveraging fine-grained channel information. In: 2014 IEEE Conference on Communications and Network Security (CNS). IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, K., Gupta, B.B. (2018). Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges. In: Lobiyal, D., Mansotra, V., Singh, U. (eds) Next-Generation Networks. Advances in Intelligent Systems and Computing, vol 638. Springer, Singapore. https://doi.org/10.1007/978-981-10-6005-2_56
Download citation
DOI: https://doi.org/10.1007/978-981-10-6005-2_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6004-5
Online ISBN: 978-981-10-6005-2
eBook Packages: EngineeringEngineering (R0)