Skip to main content

Mobile Systems and Corresponding Intractable Security Issues

  • Chapter
  • First Online:
  • 192k Accesses

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

In the previous two chapters, 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems and we propose solutions in some cases. What we did not do is actually put all these devices and technologies together to create the current phenomenal mobile communication devices, and the technology is currently driving computing and communication. We are going to do this in this chapter and more. The last two decades have witnessed a revolution of sorts in communication spearheaded by the rapidly evolving technologies in both software and hardware. A mobile communication system consists of two or more of the following devices, running specifically developed software to sustain, for a period of time, a wireless communication link between them: mobile telephone, broadly construed here to include devices based on code division multiple access (CDMA), time division multiple access (TDMA), Global System for Mobile Communications (GSM), and wireless personal digital assistant (WPDA) digital technologies and follow-ons, as well as satellite telephones and e-mail appliances. Mobile communication systems are revolutionizing the world today, shrinking the world to between two or more small handheld mobile devices. The rapid changes in communication technologies, the revolutionary changes in software, and the growth of large powerful communication network technologies all have eased communication and brought it to large swaths of the globe. The high-end competition between the mobile telecommunication operators resulting in plummeting device prices, the quickly developing smartphone technology, and the growing number of undersea cables and cheaper satellite technologies are bringing Internet access to almost every one of the global rural poor faster than many had anticipated.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Wikipedia > Mobile Operating Systems. https://en.wikipedia.org/wiki/Mobile_operating_system#Tizen

References

  1. Acohido B. New security flaws detected in mobile devices, USA Today. http://www.enterprise-security-today.com/news/Mobile-Devices-Vulnerable-to-Attack/story.xhtml?story_id=0010003FAI65, April 10, 2012 9:50AM

  2. Lookout Mobile Threat Report, 2011. Lookout mobile security. https://www.mylookout.com/_downloads/lookout-mobile-threat-report-2011.pdf

  3. Jean. Analysis of the jailbreakme v3 font exploit, Segeti ESEC Lab. http://esec-lab.sogeti.com/posts/2011/07/16/analysis-of-the-jailbreakme-v3-font-exploit.html

  4. C-Skills (July23, 2010) http://c-skills.blogspot.com/search?q=exploid

  5. Wikipe4dia. Mobile security. https://en.wikipedia.org/wiki/Mobile_security

  6. Types Of Bluetooth Hacks And Its Security Issues, HubPages. http://hubpages.com/technology/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues

  7. Wikipedia. Bluetooth. https://en.wikipedia.org/wiki/Bluetooth#Security

  8. Mobilifesafe. Mobile devices expose company data to severe vulnerabilities, PR Newswire. April 9, 2012. http://www.prnewswire.com/news-releases/mobilisafe-study-details-vulnerability-risk-to-company-data-for-smbs-146647805.html

  9. Brandenberg M. Mobile device security overview. TechTarget. http://searchconsumerization.techtarget.com/tutorial/Mobile-device-security-overview

  10. Wekipedia. http://en.wikipedia.org/wiki/Mobile_device_management

  11. Adhikari R. Encryption on the Go, Part 1, TechNewsWorld. http://www.technewsworld.com/story/75245.html

  12. http://trifinite.org/trifinite_stuff_bluedump.html

  13. Komisky M. Mobile device security II: handheld operating systems, Bluefire. http://www.datamation.com/mowi/article.php/3575316/Mobile-Device-Security-II-Handheld-Operating-Systems.htm

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Mobile Systems and Corresponding Intractable Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics