Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 9 )

2019 ( 97 )

2018 ( 235 )

2017 ( 221 )

Custom range...

Search Results: 1 - 10 of 10201 matches for " Mobile Security "
All listed articles are free for downloading (OA Articles)
Page 1 /10201
Display every page Item
Secure Bluetooth for Trusted m-Commerce  [PDF]
Pasquale Stirparo, Jan L?schner
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.66030

Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.

An Overview of Mobile Malware and Solutions  [PDF]
Fan Wu, Hira Narang, Dwayne Clarke
Journal of Computer and Communications (JCC) , 2014, DOI: 10.4236/jcc.2014.212002

Mobile Security has been a rapidly growing field in the security area. With the increases of mobile devices and mobile applications, the need for mobile security has increased dramatically over the past several years. Many research and development projects on mobile security are ongoing in government, industry and academia. In this paper, we present an analysis of current mobile security problems and propose the possible solutions to malware threats. Our experiments show antimalware can protect mobile device from different types of mobile malware threats effectively.

Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It  [PDF]
Hieu Le Thanh
Journal of Information Security (JIS) , 2013, DOI: 10.4236/jis.2013.44024

The sale of products using the android Operation System (OS) phone is increasing in rate: the fact is that its price is cheaper but its configured hardware is higher, users easily buy it and the approach to this product increases the risk of the spread of mobile malware. The understanding of majority of the users of this mobile malware is still limited. While they are growing at a faster speed in the number and level of sophistication, especially their variations have created confusion for users; therefore worrying about the safety of its users is required. In this paper, the author discussed the identification and analysis of malware families on Android Mobiles. The author selected the recognizable characteristics from ordinary users with their families collected from 58 malware families and 1485 malware samples and proposed solutions as recommendations to users before installing it with the ultimate desire to mitigate the damage in the community that is on the android phone, especially the ordinary users with limited understanding about potential hazards. It would be helpful for the ordinary users to identify the mobile malware in order to mitigate the information security risk.

Wireless Network Security: The Mobile Agent Approach  [PDF]
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.610046
Abstract: The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.
Camera and Voice Control Based Location Services and Information Security on Android  [PDF]
Jitendra G. Chouhan, Nikhil Kumar Singh, Prashant S. Modi, Keyurbhai A. Jani, Bhavin N. Joshi
Journal of Information Security (JIS) , 2016, DOI: 10.4236/jis.2016.73015
Abstract: Increasing popularity of Android is making its security issue more crucial nowadays. This paper focuses on one-stop solution to secure Android device against information security and theft. Proposed application protects Android device against theft and helps to control Android device by SMS or using internet connection. By this application once the user has configured the account for anti theft, user can remotely track, sound a loud siren, lock, secretly capture photo of an intruder who tries to break in, get randomly recorded voice of intruder, get thief identity using device web history and can able to wipe all your private data. This data and tracking information will be stored in one central web server database and one can access it anytime through login.
Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures  [PDF]
J?rg Uffen, Nico Kaemmerer, Michael H. Breitner
Journal of Information Security (JIS) , 2013, DOI: 10.4236/jis.2013.44023

In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model; cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.

Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks  [PDF]
Arif Sari, Mehmet Karay
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.813051
Abstract: There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security.
The WiMAX Technology
Felician ALECU
Oeconomics of Knowledge , 2010,
Abstract: WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used.
Design and Analysis on Error Handing and Controlling Protocol in Mobile Payment
Yong Xu,Tingting YAN
Journal of Networks , 2012, DOI: 10.4304/jnw.7.2.357-364
Abstract: On purpose to study and solve the mobile payment problems based on MPTP in China, this paper proposed to put forward Error Handling and Controlling Protocol (EHCP) and describe this protocol and the execution process. EHCP is aimed to perfect mobile payment communication mechanism and further solve mobile payment security issues in order to make mobile payment becomes more widely accepted. Messages sending and receiving among three parties in the payment system is described. Finally, the analysis illustrates that our protocol achieves the goals of high security, fairness and efficiency.
MB-C: Check-in Mobile Application using Barcodes
Mohammed Samaka,Mohammed Hassan,Ahmed Ould Mohamedou,Mohammed Al-Sada
Communications of the IBIMA , 2008,
Abstract: This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider’s venue or facility. The MB-C integrates both web and wireless technologies. It provides a wireless service, over the cellular network that sends a barcode containing the check-in details, directly to the client’s mobile handset via SMS or MMS. The barcode is then verified via a scanner at the security control point (or the check-in counter) prior to accessing the venue or using the facility. The MB-C can be implemented in many real-life situations that involve either a client or a vehicle in a check-in process due to security needs.
Page 1 /10201
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.