Mobile Computing and Security Issues

Authors

  • Owodele Odukale

DOI:

https://doi.org/10.53555/cse.v1i1.889

Keywords:

MOBILE, COMPUTING, SECURITY, ISSUES

Abstract

The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange, online social gaming amongst others. However its use in the transmission of more sensitive data gives causes for concern due to its security vulnerabilities. Traditional computing systems make use of certain detection technologies and firewalls to prevent intrusion but such methods are difficult to apply with mobile computing thus making the security of data between mobile workstations and mobile unit a challenge. Challenges experienced in mobile communication include: forced de-authentication, disconnection and mimicry of the host mobile station or unit. The purpose of this research is to propose a secure mobile communication scheme that makes use of an asymmetric algorithm to encode the messages before transmission so as to provide secure communication over the channel. The mobile client will have a public key and a private key that will be used to encode messages sent over the communication channel while the server side decrypts the message using the private key.

Downloads

Download data is not yet available.

References

Smart, Nigel (February 19, 2008). "Dr Clifford Cocks CB". Bristol University. Retrieved August 14,2011.

Adrian Leunga, Yingli Shengb, Haitham Cruickshankb, "The security challenges for mobile ubiquitous services" Information Security Group, Royal Holloway, University of London, Egham, UKbCentre for Communication Systems Research, University of Surrey, Guildford, Surrey, UK , 2007.

B. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in distributed systems: Theory and practice,” Technical Report 83, Digital Systems Research Center, February 1992.

T. Leighton and S. Micali, “Secret-key agreement without public-key cryptography,”in Advances in Cryptology —Proceedings of Crypto ’93 (D. R. Stinson, ed.), vol. 773 of Lecture Notes in Computer Science, pp. 456—479, Springer-Verlag, 1993.http://www.naharnet.com/stories/en/676.

Naharnet Newsdesk(28 October 2010). Men Disguised as Women Likely Involved in Attack on UN Investigators in Dahiyeh http://www.nascio.org/publications/documents/NASCIO-securityAtTheEdge.pdf, july 2009.

John Edwards, DOD tackles security challenges of mobile computing, defense Systems, June 13, 2011.

Downloads

Published

2015-01-31

How to Cite

Odukale, O. (2015). Mobile Computing and Security Issues. International Journal For Research In Advanced Computer Science And Engineering, 1(1), 25–34. https://doi.org/10.53555/cse.v1i1.889