Mobile Networks and Management. 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Revised Selected Papers

Research Article

Security in Mobile Computing: Attack Vectors, Solutions, and Challenges

Download
288 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-52712-3_13,
        author={Sara Alwahedi and Mariam Al Ali and Fatimah Ishowo-Oloko and Wei Woon and Zeyar Aung},
        title={Security in Mobile Computing: Attack Vectors, Solutions, and Challenges},
        proceedings={Mobile Networks and Management. 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Revised Selected Papers},
        proceedings_a={MONAMI},
        year={2017},
        month={1},
        keywords={Mobile computing Smart phone Security Attack vectors},
        doi={10.1007/978-3-319-52712-3_13}
    }
    
  • Sara Alwahedi
    Mariam Al Ali
    Fatimah Ishowo-Oloko
    Wei Woon
    Zeyar Aung
    Year: 2017
    Security in Mobile Computing: Attack Vectors, Solutions, and Challenges
    MONAMI
    Springer
    DOI: 10.1007/978-3-319-52712-3_13
Sara Alwahedi1,*, Mariam Al Ali1,*, Fatimah Ishowo-Oloko1,*, Wei Woon1,*, Zeyar Aung1,*
  • 1: Masdar Institute of Science and Technology
*Contact email: salwahedi@masdar.ac.ae, maralali@masdar.ac.ae, fishowooloko@masdar.ac.ae, wwoon@masdar.ac.ae, zaung@masdar.ac.ae

Abstract

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It covers the modern mobile operating systems that are being widely used today. It also identifies the various types of attack vectors particularly designed to infect mobile devices and highlights the available security solution to counter each type of attack. Finally, it briefly discusses the outstanding limitations and challenges in the mobile computing world.