Abstract
In the previous two chapters, 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems and we propose solutions in some cases. What we did not do is actually put all these devices and technologies together to create the current phenomenal mobile communication devices, and the technology is currently driving computing and communication. We are going to do this in this chapter and more. The last two decades have witnessed a revolution of sorts in communication spearheaded by the rapidly evolving technologies in both software and hardware. A mobile communication system consists of two or more of the following devices, running specifically developed software to sustain, for a period of time, a wireless communication link between them: mobile telephone, broadly construed here to include devices based on code division multiple access (CDMA), time division multiple access (TDMA), Global System for Mobile Communications (GSM), and wireless personal digital assistant (WPDA) digital technologies and follow-ons, as well as satellite telephones and e-mail appliances. Mobile communication systems are revolutionizing the world today, shrinking the world to between two or more small handheld mobile devices. The rapid changes in communication technologies, the revolutionary changes in software, and the growth of large powerful communication network technologies all have eased communication and brought it to large swaths of the globe. The high-end competition between the mobile telecommunication operators resulting in plummeting device prices, the quickly developing smartphone technology, and the growing number of undersea cables and cheaper satellite technologies are bringing Internet access to almost every one of the global rural poor faster than many had anticipated.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Wikipedia > Mobile Operating Systems. https://en.wikipedia.org/wiki/Mobile_operating_system#Tizen
References
Acohido B. New security flaws detected in mobile devices, USA Today. http://www.enterprise-security-today.com/news/Mobile-Devices-Vulnerable-to-Attack/story.xhtml?story_id=0010003FAI65, April 10, 2012 9:50AM
Lookout Mobile Threat Report, 2011. Lookout mobile security. https://www.mylookout.com/_downloads/lookout-mobile-threat-report-2011.pdf
Jean. Analysis of the jailbreakme v3 font exploit, Segeti ESEC Lab. http://esec-lab.sogeti.com/posts/2011/07/16/analysis-of-the-jailbreakme-v3-font-exploit.html
C-Skills (July23, 2010) http://c-skills.blogspot.com/search?q=exploid
Wikipe4dia. Mobile security. https://en.wikipedia.org/wiki/Mobile_security
Types Of Bluetooth Hacks And Its Security Issues, HubPages. http://hubpages.com/technology/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues
Wikipedia. Bluetooth. https://en.wikipedia.org/wiki/Bluetooth#Security
Mobilifesafe. Mobile devices expose company data to severe vulnerabilities, PR Newswire. April 9, 2012. http://www.prnewswire.com/news-releases/mobilisafe-study-details-vulnerability-risk-to-company-data-for-smbs-146647805.html
Brandenberg M. Mobile device security overview. TechTarget. http://searchconsumerization.techtarget.com/tutorial/Mobile-device-security-overview
Wekipedia. http://en.wikipedia.org/wiki/Mobile_device_management
Adhikari R. Encryption on the Go, Part 1, TechNewsWorld. http://www.technewsworld.com/story/75245.html
Komisky M. Mobile device security II: handheld operating systems, Bluefire. http://www.datamation.com/mowi/article.php/3575316/Mobile-Device-Security-II-Handheld-Operating-Systems.htm
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Mobile Systems and Corresponding Intractable Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)