Evaluation of Smartphone Security Challenges and Measures

Authors

  • Sai Kiran Reddy Malikireddy  Department of Computer Science, University of South Florida, Tampa, Florida, USA
  • Kiranmayi Karri  Department of Computer Science, University of South Florida, Tampa, Florida, USA
  • Tejaswi Chirumalla  Department of Computer Science, University of South Florida, Tampa, Florida, USA

DOI:

https://doi.org/10.32628/IJSRST1625414

Keywords:

Smartphone's, Security, Attacks, Malware, Detection

Abstract

The term Smartphone refers to a mobile phone integrated with an operating system like Android, iOS, Windows. In today's technological world, Smartphone's have become ubiquitous[. The main reason of such high usage of these phones is that their ability to perform multiple functions when compared to the traditional mobile phones. In addition to the features provided by the traditional mobile phones, these phones support a wide variety of operations such as access to the internet through Wi-Fi/3G/4G connectivity, most of such devices have an in-built browser to perform this operation[1][2]. Apart from this feature, it also provides Bluetooth connectivity, access to digital media, for mobile payment transactions integrated with NFC technology, gives location accuracy, enable the feature of downloading third party applications. Most of functions which are performed by the personal computers can also be done using these. We are in a position where there is more utilization of Smartphone's when compared to the traditional PC's in today's market. These devices also carry highly confidential data such as bank details, social media accounts, email details and more. One could also observe that with the increase in the utilization of these devices, there is more and more storage of personal information on it. With this increase in the popularity of the devices, there are also many vulnerable attacks and many other security issues with them. Types of attacks can be mobile malware, phishing scams, and network spoofing attacks, surveillance attacks, and network congestion. In this interim report, we focus and provide our analysis or survey on various such kinds of attacks, give few in depth details and report accordingly.

References

  1. Jaramillo, D.; Newhook, R.; Nassar, N. "Techniques and real world experiences in mobile device security", SOUTHEASTCON 2014, IEEE, On page(s): 1 - 6
  2. Milosevic, J.; Dittrich, A.; Ferrante, A.; Malek, M. "A ResourceOptimized Approach to Efficient Early Detection of Mobile Malware", Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, On page(s): 333 - 340
  3. “Smartphone security challenges” Yong Wang, Kevin Streff, and Sonell Raman, Dakota State University. December 2012
  4. Smartphone malware detection: From a survey towardstaxonomy, Amamra, A. ; Talhi, C. ; Robert, J., Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on DOI: 10.1109/MALWARE.2012.6461012
  5. Research in Progress Defending Android Smartphone from malware attacks,Omar,M. ; Dawson,M. AdvancedComputingand Communication Technologies (ACCT), 2013 Third International Conference on DOI: 10.1109/ACCT.2013.69
  6. Penning, N.; Hoffman, M.; Nikolai, J.; Yong Wang "Mobile malware security challeges and cloud-based detection", Collaboration Technologies and Systems (CTS), 2014 International Conference on, On page(s): 181 - 188
  7. Yong Wang; Vangury, K.; Nikolai, J. "MobileGuardian: A security policy enforcement framework for mobile devices", Collaboration Technologies and Systems (CTS), 2014 International Conference on, On page(s): 197 - 202
  8. “Smartphone Security Evaluation”Alexios Mylonas, Stelios Dritsas, Bill Tsoumas and Dimitris Gritzalis Department of Informatics, Athens University of Economics & Business (AUEB)
  9. Performance analysis of intrusion detection systems forSmartphone security enhancements Salah, S. ; Abdulhak, S.A. ; Hyontai Sug ; Dae-Ki Kang ; HoonJae Lee Mobile IT Convergence (ICMIC), 2011 International Conference on Publication Year: 2011 , Page(s): 15 - 19
  10. Smartphone security evaluation The malware attack case Mylonas, Alexios ; Dritsas, Stelios ; Tsoumas, Bill ; Gritzalis, Dimitris Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on Publication Year: 2011 , Page(s): 25 - 36 http://iacis.org/iis/2013/300_iis_2013_329-335.pdfMilosevic,
  11. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/criticalapplications/smartphone-security-1/top-ten-risks/surveillance-attacks http://www.enck.org/pubs/enck-iciss11.pdf
  12. Anti-Phishing by Smart Mobile Device,Weili Han ; Yi Wang ; Ye Cao ; Jiping Zhou ; Lixing Wang ,Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on DOI: 10.1109/NPC.2007.68 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.308.6665&rep =rep1&type=pdf
  13. R. Dhamija, J. D. Tygar, and M. Hearst. Why Phishing Works. In CHI, 2006.
  14. M. Jakobsson and W. Leddy. SpoofKiller. http://www.spoofkiller.com.
  15. http://www.markus-jakobsson.com/wpcontent/uploads/SpoofKiller_Markus_Jakobsson_Hossein_Siadati.pdf
  16. Mobile Attacks and Defense, Miller, C. ,Security & Privacy, IEEE Volume:9, Issue: 4,DOI: 10.1109/MSP.2011.85
  17. Smartphone security awareness: Time to act Al-Hadadi, M. ; Al Shidhani, A. Current Trends in Information Technology (CTIT), 2013 International Conference on DOI: 10.1109/CTIT.2013.6749496
  18. How secure is your smartphone: An analysis of smartphone security mechanismsKhan, S. ; Nauman, M. ; Othman, A.T. ; Musa, S. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on DOI: 10.1109/CyberSec.2012.6246082

Downloads

Published

2016-07-30

Issue

Section

Research Articles

How to Cite

[1]
Sai Kiran Reddy Malikireddy, Kiranmayi Karri, Tejaswi Chirumalla "Evaluation of Smartphone Security Challenges and Measures" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 2, Issue 4, pp.382-391, July-August-2016. Available at doi : https://doi.org/10.32628/IJSRST1625414