Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.4.30

Mobile Devices Technologies: Risks and Security  

Alsaqour, Raed (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University)
Alharthi, Sultan (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University)
Aldehaimi, Khalid (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University)
Abdelhaq, Maha (Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.4, 2021 , pp. 249-254 More about this Journal
Abstract
Our society is depending on mobile devices that play a major role in our lives. Utilizing these devices is possible due to their speed power and efficiency in performing basic as well as sophisticated operations that can be found in traditional computers like desktop workstations. The challenge with using mobile devices is that organizations are concerned with the interference between personal and corporate use due to Bring Your Own Device (BYOD) trend. This paper highlights the importance of mobile devices in our daily tasks and the associated risks involved with using these devices. Several technologies and countermeasures are reviewed in this paper to secure the mobile devices from different attempts of attacks. It is important to mention that this paper focuses on technical measures rather than considering different aspects of security measures as recommended by the cybersecurity community.
Keywords
Mobile Security; BYOD; Multifactor Authentication; MDM; MSS; Security Policy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Kim, Y. Jeon, and J. Kim, "Secure mobile device management based on domain separation," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 918-920.
2 S. S. Manvi, L. B. Bhajantri, and M. Vijayakumar, "Secure mobile payment system in wireless environment," in 2009 International Conference on Future Computer and Communication, 2009, pp. 31-35.
3 P. Vinayakray-Jani, "Roadmap for Securing Handheld Devices," in IFIP International Information Security Conference, 2003, pp. 477-482.
4 H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi, "Probing attacks on integrated circuits: Challenges and research opportunities," IEEE Design & Test, vol. 34, pp. 63-71, 2017.
5 E. Biagioni, "Preventing UDP flooding amplification attacks with weak authentication," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 78-82.
6 D. Goel and A. K. Jain, "Mobile phishing attacks and defence mechanisms: State of art and open research challenges," Computers & Security, vol. 73, pp. 519-544, 2018.   DOI
7 J. Nie, P. Wang, and L. Lei, "Why can't we be separated from our smartphones? The vital roles of smartphone activity in smartphone separation anxiety," Computers in Human Behavior, vol. 109, p. 106351, 2020.   DOI
8 W. L. M. A. C. M. a. P. L. P. S. h. s. i. o. The Institute of Electrical and Electronics Engineers (IEEE), ANSI/IEEE Std.802.11, 1999. (a.k.a. ISO/IEC 8802-11:1999(E)).
9 A. Lima, L. Rosa, T. Cruz, and P. Simoes, "A Security Monitoring Framework for Mobile Devices," Electronics, vol. 9, p. 1197, 2020.   DOI
10 M. A. Harris and K. P. Patten, "Mobile device security considerations for small-and medium-sized enterprise business mobility," Information Management & Computer Security, 2014.
11 S. B. Utomo and B. Hendradjaya, "Multifactor authentication on mobile secure attendance system," in 2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5.
12 R. Hartman, C. Rokitta, and D. Peake, Oracle Application Express for Mobile Web Applications: Springer, 2013.
13 S. Furnell, "Securing mobile devices: technology and attitude," Network Security, vol. 2006, pp. 9-13, 2006.   DOI
14 M. A. Al-shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Review of prevention schemes for man-in-themiddle (MITM) attack in vehicular ad hoc networks," International Journal of Engineering and Management Research, vol. 10, 2020.
15 J. Srinivas, A. K. Das, and N. Kumar, "Government regulations in cyber security: Framework, standards and recommendations," Future Generation Computer Systems, vol. 92, pp. 178-188, 2019.   DOI
16 B. Halpert, "Mobile device security," in Proceedings of the 1st annual conference on Information security curriculum development, 2004, pp. 99-101.
17 S. M. Dye and K. Scarfone, "A standard for developing secure mobile applications," Computer Standards & Interfaces, vol. 36, pp. 524-530, 2014.   DOI
18 L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 319-330, 2018.   DOI