DOI QR코드

DOI QR Code

Mobile Devices Technologies: Risks and Security

  • Alsaqour, Raed (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Alharthi, Sultan (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Aldehaimi, Khalid (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Abdelhaq, Maha (Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University)
  • Received : 2021.04.05
  • Published : 2021.04.30

Abstract

Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.

Keywords

References

  1. J. Nie, P. Wang, and L. Lei, "Why can't we be separated from our smartphones? The vital roles of smartphone activity in smartphone separation anxiety," Computers in Human Behavior, vol. 109, p. 106351, 2020. https://doi.org/10.1016/j.chb.2020.106351
  2. S. B. Utomo and B. Hendradjaya, "Multifactor authentication on mobile secure attendance system," in 2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5.
  3. G. Kim, Y. Jeon, and J. Kim, "Secure mobile device management based on domain separation," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 918-920.
  4. S. S. Manvi, L. B. Bhajantri, and M. Vijayakumar, "Secure mobile payment system in wireless environment," in 2009 International Conference on Future Computer and Communication, 2009, pp. 31-35.
  5. S. Furnell, "Securing mobile devices: technology and attitude," Network Security, vol. 2006, pp. 9-13, 2006. https://doi.org/10.1016/S1353-4858(06)70431-7
  6. A. Lima, L. Rosa, T. Cruz, and P. Simoes, "A Security Monitoring Framework for Mobile Devices," Electronics, vol. 9, p. 1197, 2020. https://doi.org/10.3390/electronics9081197
  7. P. Vinayakray-Jani, "Roadmap for Securing Handheld Devices," in IFIP International Information Security Conference, 2003, pp. 477-482.
  8. M. A. Al-shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Review of prevention schemes for man-in-themiddle (MITM) attack in vehicular ad hoc networks," International Journal of Engineering and Management Research, vol. 10, 2020.
  9. H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi, "Probing attacks on integrated circuits: Challenges and research opportunities," IEEE Design & Test, vol. 34, pp. 63-71, 2017.
  10. E. Biagioni, "Preventing UDP flooding amplification attacks with weak authentication," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 78-82.
  11. D. Goel and A. K. Jain, "Mobile phishing attacks and defence mechanisms: State of art and open research challenges," Computers & Security, vol. 73, pp. 519-544, 2018. https://doi.org/10.1016/j.cose.2017.12.006
  12. J. Srinivas, A. K. Das, and N. Kumar, "Government regulations in cyber security: Framework, standards and recommendations," Future Generation Computer Systems, vol. 92, pp. 178-188, 2019. https://doi.org/10.1016/j.future.2018.09.063
  13. R. Hartman, C. Rokitta, and D. Peake, Oracle Application Express for Mobile Web Applications: Springer, 2013.
  14. B. Halpert, "Mobile device security," in Proceedings of the 1st annual conference on Information security curriculum development, 2004, pp. 99-101.
  15. M. A. Harris and K. P. Patten, "Mobile device security considerations for small-and medium-sized enterprise business mobility," Information Management & Computer Security, 2014.
  16. S. M. Dye and K. Scarfone, "A standard for developing secure mobile applications," Computer Standards & Interfaces, vol. 36, pp. 524-530, 2014. https://doi.org/10.1016/j.csi.2013.09.005
  17. L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 319-330, 2018. https://doi.org/10.1109/tifs.2018.2850299
  18. W. L. M. A. C. M. a. P. L. P. S. h. s. i. o. The Institute of Electrical and Electronics Engineers (IEEE), ANSI/IEEE Std.802.11, 1999. (a.k.a. ISO/IEC 8802-11:1999(E)).