Evaluation of Smartphone Security Challenges and Measures
DOI:
https://doi.org/10.32628/IJSRST1625414Keywords:
Smartphone's, Security, Attacks, Malware, DetectionAbstract
The term Smartphone refers to a mobile phone integrated with an operating system like Android, iOS, Windows. In today's technological world, Smartphone's have become ubiquitous[. The main reason of such high usage of these phones is that their ability to perform multiple functions when compared to the traditional mobile phones. In addition to the features provided by the traditional mobile phones, these phones support a wide variety of operations such as access to the internet through Wi-Fi/3G/4G connectivity, most of such devices have an in-built browser to perform this operation[1][2]. Apart from this feature, it also provides Bluetooth connectivity, access to digital media, for mobile payment transactions integrated with NFC technology, gives location accuracy, enable the feature of downloading third party applications. Most of functions which are performed by the personal computers can also be done using these. We are in a position where there is more utilization of Smartphone's when compared to the traditional PC's in today's market. These devices also carry highly confidential data such as bank details, social media accounts, email details and more. One could also observe that with the increase in the utilization of these devices, there is more and more storage of personal information on it. With this increase in the popularity of the devices, there are also many vulnerable attacks and many other security issues with them. Types of attacks can be mobile malware, phishing scams, and network spoofing attacks, surveillance attacks, and network congestion. In this interim report, we focus and provide our analysis or survey on various such kinds of attacks, give few in depth details and report accordingly.
References
- Jaramillo, D.; Newhook, R.; Nassar, N. "Techniques and real world experiences in mobile device security", SOUTHEASTCON 2014, IEEE, On page(s): 1 - 6
- Milosevic, J.; Dittrich, A.; Ferrante, A.; Malek, M. "A ResourceOptimized Approach to Efficient Early Detection of Mobile Malware", Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, On page(s): 333 - 340
- “Smartphone security challenges” Yong Wang, Kevin Streff, and Sonell Raman, Dakota State University. December 2012
- Smartphone malware detection: From a survey towardstaxonomy, Amamra, A. ; Talhi, C. ; Robert, J., Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on DOI: 10.1109/MALWARE.2012.6461012
- Research in Progress Defending Android Smartphone from malware attacks,Omar,M. ; Dawson,M. AdvancedComputingand Communication Technologies (ACCT), 2013 Third International Conference on DOI: 10.1109/ACCT.2013.69
- Penning, N.; Hoffman, M.; Nikolai, J.; Yong Wang "Mobile malware security challeges and cloud-based detection", Collaboration Technologies and Systems (CTS), 2014 International Conference on, On page(s): 181 - 188
- Yong Wang; Vangury, K.; Nikolai, J. "MobileGuardian: A security policy enforcement framework for mobile devices", Collaboration Technologies and Systems (CTS), 2014 International Conference on, On page(s): 197 - 202
- “Smartphone Security Evaluation”Alexios Mylonas, Stelios Dritsas, Bill Tsoumas and Dimitris Gritzalis Department of Informatics, Athens University of Economics & Business (AUEB)
- Performance analysis of intrusion detection systems forSmartphone security enhancements Salah, S. ; Abdulhak, S.A. ; Hyontai Sug ; Dae-Ki Kang ; HoonJae Lee Mobile IT Convergence (ICMIC), 2011 International Conference on Publication Year: 2011 , Page(s): 15 - 19
- Smartphone security evaluation The malware attack case Mylonas, Alexios ; Dritsas, Stelios ; Tsoumas, Bill ; Gritzalis, Dimitris Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on Publication Year: 2011 , Page(s): 25 - 36 http://iacis.org/iis/2013/300_iis_2013_329-335.pdfMilosevic,
- https://www.enisa.europa.eu/activities/Resilience-and-CIIP/criticalapplications/smartphone-security-1/top-ten-risks/surveillance-attacks http://www.enck.org/pubs/enck-iciss11.pdf
- Anti-Phishing by Smart Mobile Device,Weili Han ; Yi Wang ; Ye Cao ; Jiping Zhou ; Lixing Wang ,Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on DOI: 10.1109/NPC.2007.68 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.308.6665&rep =rep1&type=pdf
- R. Dhamija, J. D. Tygar, and M. Hearst. Why Phishing Works. In CHI, 2006.
- M. Jakobsson and W. Leddy. SpoofKiller. http://www.spoofkiller.com.
- http://www.markus-jakobsson.com/wpcontent/uploads/SpoofKiller_Markus_Jakobsson_Hossein_Siadati.pdf
- Mobile Attacks and Defense, Miller, C. ,Security & Privacy, IEEE Volume:9, Issue: 4,DOI: 10.1109/MSP.2011.85
- Smartphone security awareness: Time to act Al-Hadadi, M. ; Al Shidhani, A. Current Trends in Information Technology (CTIT), 2013 International Conference on DOI: 10.1109/CTIT.2013.6749496
- How secure is your smartphone: An analysis of smartphone security mechanismsKhan, S. ; Nauman, M. ; Othman, A.T. ; Musa, S. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on DOI: 10.1109/CyberSec.2012.6246082
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.