Security in mobile computing: Attack vectors, solutions, and challenges

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It covers the modern mobile operating systems that are being widely used today. It also identifies the various types of attack vectors particularly designed to infect mobile devices and highlights the available security solution to counter each type of attack. Finally, it briefly discusses the outstanding limitations and challenges in the mobile computing world.

Cite

CITATION STYLE

APA

Alwahedi, S., Ali, M. A., Ishowo-Oloko, F., Woon, W. L., & Aung, Z. (2017). Security in mobile computing: Attack vectors, solutions, and challenges. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 191, pp. 177–191). Springer Verlag. https://doi.org/10.1007/978-3-319-52712-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free