Security in mobile computing: Attack vectors, solutions, and challenges

  • Sara Alwahedi
  • , Mariam Al Ali
  • , Fatimah Ishowo-Oloko
  • , Wei Lee Woon
  • , Zeyar Aung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It covers the modern mobile operating systems that are being widely used today. It also identifies the various types of attack vectors particularly designed to infect mobile devices and highlights the available security solution to counter each type of attack. Finally, it briefly discusses the outstanding limitations and challenges in the mobile computing world.

Original languageBritish English
Title of host publicationMobile Networks and Management - 8th International Conference, MONAMI 2016, Revised Selected Papers
EditorsYasir Zaki, Anna Forster, Bernd-Ludwig Wenning, Ramon Aguero, Andreas Timm-Giel
PublisherSpringer Verlag
Pages177-191
Number of pages15
ISBN (Print)9783319527116
DOIs
StatePublished - 2017
Event8th EAI International Conference on Mobile Networks and Management, MONAMI 2016 - Abu Dhabi, United Arab Emirates
Duration: 23 Oct 201624 Oct 2016

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume191
ISSN (Print)1867-8211

Conference

Conference8th EAI International Conference on Mobile Networks and Management, MONAMI 2016
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period23/10/1624/10/16

Keywords

  • Attack vectors
  • Mobile computing
  • Security
  • Smart phone

Fingerprint

Dive into the research topics of 'Security in mobile computing: Attack vectors, solutions, and challenges'. Together they form a unique fingerprint.

Cite this