Demanding Requirement of Security for Wireless Mobile Devices: A Survey

Today, the technology advancement in telecommunication facilitates users to bear portable devices with convenient and timely accessing to their personal and business data on the fly. In this regard, mobile and ubiquitous devices become part of the user's personal or business growing. Recently, the usage of portable devices has drastically amplified due to wireless data technologies such as GPRS, GSM, Bluetooth, WI-Fi and WiMAX. As the use of wireless portable devices increases, the risks associated with them also increases. Specifically Android Smart- phone which can access the Internet may now signify an ultimate option for malware authors. As the core open communication mediocre, the Airwave, is susceptible, there has been a rise of a security technique suggested by researchers. When comparing to security measures proposed to protect wireless devices, protecting mobile vulnerabilities is still immature. So in this study, we present an organized and widespread overview of the research on the security elucidation for wireless portable devices. This survey study discusses the security risks imposed by vulnerabilities, threats and security measures in the recent past, mainly spotlighting on complex attacks to user applications. We classify existing countermeasures at guarding wireless mobile devices facing different kinds of attacks into various groups; depend on the revealing technique, collected information and operating systems. In the next phase we will design and implement new security model to protect mobile phone resources against unknown vulnerabilities.

[1]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[2]  Dennis J. Turner,et al.  Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .

[3]  Herbert Bos,et al.  Protecting smart phones by means of execution replication , 2010 .

[4]  Jason Flinn,et al.  Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.

[5]  Randy C. Marchany,et al.  Using Battery Constraints within Mobile Hosts to Improve Network Security , 2006, IEEE Security & Privacy.

[6]  Luis González Abril,et al.  A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services , 2011, KSII Trans. Internet Inf. Syst..

[7]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[8]  Alan J. Marshall,et al.  Detection and analysis of the Chameleon WiFi access point virus , 2013, EURASIP J. Inf. Secur..

[9]  Marko Helenius,et al.  About malicious software in smartphones , 2006, Journal in Computer Virology.

[10]  Neal Leavitt Malicious Code Moves to Mobile Devices , 2000, Computer.

[11]  Swee-Huay Heng,et al.  Mobile and ubiquitous malware , 2009, MoMM.

[12]  Guanhua Yan,et al.  SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection , 2009, RAID.

[13]  George Lawton Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.

[14]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[15]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[16]  Felix C. Freiling,et al.  Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.

[17]  Farnam Jahanian,et al.  When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments , 2010, HotMobile '10.

[18]  Arati Baliga,et al.  Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.

[19]  Felix C. Freiling,et al.  Towards Dynamic Malware Analysis to Increase Mobile Device Security423 , 2008, Sicherheit.

[20]  Maria Papadaki,et al.  Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.