Browse > Article
http://dx.doi.org/10.3745/JIPS.2008.3.2.054

Actual Condition and Issues for Mobile Security System  

Sakurai, Kouichi (Kyushu University)
Fukushima, Kazuhide (KDDI R&D Laboratories, Inc)
Publication Information
Journal of Information Processing Systems / v.3, no.2, 2007 , pp. 54-63 More about this Journal
Abstract
The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.
Keywords
Mobile Security; Mobile Malware; Mobile DRM System; Mobile WiMAX Security; Group Key Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Wayne Jansen and Rick Ayers. Guidelines on Cell Phone Forensics. Recommendations of the National Institute of Standards and Technology, Special Publication 800-101, http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf, 5 2007
2 D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC2627, http://ietf.org/rfc/rfc2627.txt, 6 1999
3 B. Weis, T. Hardjono, and H. Harney. The Group Domain of Interpretation. RFC3547, http://ietf.org/rfc/rfc3547.txt, 7 2003
4 H. Harney, U. Meth, A. Colegrove, and G. Gross. GSAKMP: Group Secure Association Key Management Protocol. RFC4535, http://ietf.org/rfc/rfc4535.txt, 6 2006
5 T. Hardjono and B. Weis. The Multicast Group Security Architecture. RFC3740, http://ietf.org/rfc/rfc3740.txt, 3 2004
6 Chung Kei Wong and Mohamed Gouda and Simon S. Lam, "Secure Group Communications Using Key Graphs", "IEEE/ACM Trans. on Networking"
7 Taeshik Shon and Wook Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Proc. of First International Conference Network-Based Information Systems (NBiS 2007), Lecture Notes in Computer Science 4658, pages 88-97, 8 2007   DOI   ScienceOn
8 Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, and Toshiaki Tanaka. Security Vulnerabilities and Solutions in Mobile WiMAX. IJCSNS International Journal of Computer Science and Network Security, 7(11):7-15, 11 2007
9 H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, http://ietf.org/rfc/rfc2094.txt, 7 1997
10 H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. RFC2093, http://ietf.org/rfc/rfc2093.txt, 7 1997
11 David Dagon, Tom Martin, and Thad Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11-15, 2004   DOI   ScienceOn
12 Neal Leavitt. Mobile Phones: The Next Frontier for Hackers? Computer, 38(4):20-23, 4 2005   DOI   ScienceOn
13 David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, 2(3):40-48, 6 2004
14 Frank Adelstein. MFP: The Mobile Forensic Platform. International Journal of Digital Evidence (IJDE), 2(1), 2003
15 Marwan Al-Zarouni. Mobile Handset Forensic Evidence: a challenge for Law Enforcement. In Proc. 4th Australian Digital Forensics Conference, 12 2006
16 WiMAX Forum. Mobile WiMAX . Part I: A Technical Overview and Performance Evaluation.http://www.wimaxforum.org/news/downloads/Mobile_WiMAX_Part1_Overview_and_Performance.pdf, 8 2006
17 Marwan Al-Zarouni. Introduction to Mobile Phone Flasher Devices and Considerations for their Use in. Mobile Phone Forensics. In Proc. of 5th Australian Digital Forensics Conference, 12 2007
18 Open Mobile Alliance. OMA Digital Rights Management V2.0. http://www.openmobilealliance.org/Technical/release_program/drm_v2_0.aspx,3 2006
19 Airspan. Mobile Wimax Security. http://www.airspan.com/pdfs/WP_Mobile_WiMAX_Security.pdf, 2007
20 Check Point Software Technologies. Check Point Full Disk Encryption. http://www.checkpoint.com/products/datasecurity/pc/index.html
21 Utimaco Safeware. SafeGuard PDA. http://americas.utimaco.com/safeguard_pda/
22 JEAG. Japan Email Anti-Abuse Group(JEAG), http://www.jeag.jp/ (Japanese only), 2005
23 Inc.) Shane Coursena (Senior Technical Consultant aKaspersky Lab. The future of mobile malware. ScienceDirect - Network Security, 2007(8):7-11, 2007   DOI   ScienceOn
24 Mikko Hypponen. Malware Goes Mobile. Scientific American Magazine 2006, pages 70-77, 2006