Skip to main content

Mobile Communication Systems and Related Security Issues

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 2998 Accesses

Abstract

In the previous two Chaps. 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems, and we propose solutions in some cases. What we did not do is actually put all these devices and technologies together to create the current phenomenal mobile communication devices, and the technology is currently driving computing and communication. We are going to do this in this chapter and more. The last two decades have witnessed a revolution of sorts in communication spearheaded by the rapidly evolving technologies in both software and hardware. A mobile communication system consists of two or more of the following devices, running specifically developed software to sustain, for a period of time, a wireless communication link between them: mobile telephone, broadly construed here to include devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, as well as satellite telephones and e-mail appliances. Mobile communication systems are revolutionizing the world today, shrinking the world to between two or more small handheld mobile devices. The rapid changes in communication technologies, revolutionary changes in software, and the growth of large powerful communication network technologies all have eased communication and brought it to large swaths of the globe. The high-end competition between the mobile telecommunication operators resulting in plummeting device prices, the quickly developing smartphone technology, and growing number of undersea cables and cheaper satellites technologies are bringing Internet access to almost every one of the global rural poor faster than many had anticipated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. “ Everything you need to know about each Mobile OS (Operating System) – Parts1- 4.” http://www.fusedblog.com/everything-you-need-to-know-about-each-mobile-os-operating-system-part-1-of-4-series-40-symbian/.

  2. Komisky, Mark., “Mobile Device Security II: Handheld Operating Systems”, Bluefire, http://www.datamation.com/mowi/article.php/3575316/Mobile-Device-Security-II-Handheld-Operating-Systems.htm.

  3. Richard, Denis. “ Why Android Is So Popular?”, http://ezinearticles.com/?Why-Android-Is-So-Popular?&id=7011641.

  4. By Byron Acohido http://www.enterprise-security-today.com/news/Mobile-Devices-Vulnerable-to-Attack/story.xhtml?story_id=0010003FAI65 , April 10, 2012 9:50AM

  5. “2011 Mobile Threat Report”, https://www.mylookout.com/mobile-threat-report.

  6. http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit.

  7. C-Skills (July23, 2010) http://c-skills.blogspot.com/search?q=exploid.

  8. C-Skills (July 15. 2010): http://c-skills.blogspot.com/.

  9. “Android Malware DroidDream How it Works”, Lookout Mobile Security Blog (March 2011) http://blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works.

  10. “Types Of Bluetooth Hacks And Its Security Issues”, http://hassam.hubpages.com/hub/.

  11. http://trifinite.org/trifinite_stuff_bluedump.html.

  12. http://trifinite.org/trifinite_stuff_bluedump.html.

  13. Mobile Devices Expose Company Data To Severe Vulnerabilities, http://www.prnewswire.com/news-releases/mobilisafe-study-details-vulnerability-risk-to-company-data-for-smbs-146647805.html.

  14. Clint Adams, http://searchconsumerization.techtarget.com/tutorial/Mobile-device-security-overview.

  15. Wekipedia, http://en.wikipedia.org/wiki/Mobile_device_management.

  16. Richard Adhikari “ Encryption on the Go, Part 1”, TechNewsWorld, http://www.technewsworld.com/story/75245.html.

  17. http://en.wikipedia.org/wiki/Smartphone_operating_systems.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2013). Mobile Communication Systems and Related Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4543-1_20

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4542-4

  • Online ISBN: 978-1-4471-4543-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics