Mobile Computing and Security Issues
DOI:
https://doi.org/10.53555/cse.v1i1.889Keywords:
MOBILE, COMPUTING, SECURITY, ISSUESAbstract
The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange, online social gaming amongst others. However its use in the transmission of more sensitive data gives causes for concern due to its security vulnerabilities. Traditional computing systems make use of certain detection technologies and firewalls to prevent intrusion but such methods are difficult to apply with mobile computing thus making the security of data between mobile workstations and mobile unit a challenge. Challenges experienced in mobile communication include: forced de-authentication, disconnection and mimicry of the host mobile station or unit. The purpose of this research is to propose a secure mobile communication scheme that makes use of an asymmetric algorithm to encode the messages before transmission so as to provide secure communication over the channel. The mobile client will have a public key and a private key that will be used to encode messages sent over the communication channel while the server side decrypts the message using the private key.
Downloads
References
Smart, Nigel (February 19, 2008). "Dr Clifford Cocks CB". Bristol University. Retrieved August 14,2011.
Adrian Leunga, Yingli Shengb, Haitham Cruickshankb, "The security challenges for mobile ubiquitous services" Information Security Group, Royal Holloway, University of London, Egham, UKbCentre for Communication Systems Research, University of Surrey, Guildford, Surrey, UK , 2007.
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in distributed systems: Theory and practice,” Technical Report 83, Digital Systems Research Center, February 1992.
T. Leighton and S. Micali, “Secret-key agreement without public-key cryptography,”in Advances in Cryptology —Proceedings of Crypto ’93 (D. R. Stinson, ed.), vol. 773 of Lecture Notes in Computer Science, pp. 456—479, Springer-Verlag, 1993.http://www.naharnet.com/stories/en/676.
Naharnet Newsdesk(28 October 2010). Men Disguised as Women Likely Involved in Attack on UN Investigators in Dahiyeh http://www.nascio.org/publications/documents/NASCIO-securityAtTheEdge.pdf, july 2009.
John Edwards, DOD tackles security challenges of mobile computing, defense Systems, June 13, 2011.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in