Security of Mobile Devices for Multimedia Applications

2008 ◽  
pp. 660-704
Author(s):  
Goran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson ◽  
Nhat Dai Tran

This chapter surveys security of mobile computing devices with focus on multimedia applications. Mobile computing devices are handheld devices such as PDAs (personal digital assistants) and smartphones with smaller size, processing, storage, and memory capacity compared to PCs (personal computers). The portability and various wireless network connection interfaces of the handheld devices greatly increase the risks of loss and theft of the device, exposure of confidential data, as well as the opportunities for unauthorized device, network, and network service access. The initial part of the chapter concentrates on discussing these basic security issues. Security requirements for wired and mobile multimedia network applications are outlined and network protocols (SIP, SRTP) for secure multimedia streaming services are presented. Mobile device security can be based on IPSec VPN technology and secure mobility is especially important in videoconferencing. Current research on roaming security and testbeds for mobile multimedia are also presented. In an appendix, commercially available mobile security solutions, mostly for basic mobile security requirements, are listed.

Author(s):  
Goran Pulkkis ◽  
Kaj J. Grahn ◽  
Jonny Karlsson ◽  
Nhat Dai Tran

This chapter surveys security of mobile computing devices with focus on multimedia applications. Mobile computing devices are handheld devices such as PDAs (personal digital assistants) and smartphones with smaller size, processing, storage, and memory capacity compared to PCs (personal computers). The portability and various wireless network connection interfaces of the handheld devices greatly increase the risks of loss and theft of the device, exposure of confidential data, as well as the opportunities for unauthorized device, network, and network service access. The initial part of the chapter concentrates on discussing these basic security issues. Security requirements for wired and mobile multimedia network applications are outlined and network protocols (SIP, SRTP) for secure multimedia streaming services are presented. Mobile device security can be based on IPSec VPN technology and secure mobility is especially important in videoconferencing. Current research on roaming security and testbeds for mobile multimedia are also presented. In an appendix, commercially available mobile security solutions, mostly for basic mobile security requirements, are listed.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2006 ◽  
Vol 48 (6) ◽  
Author(s):  
Chris Mitchell

Some of the most significant security issues arising in the context of ubiquitous mobile computing are reviewed. Emerging technologies which may be able to help overcome these security problems are also described; in particular we consider methods for secure ‘imprinting’ of mobile devices, techniques proposed for establishing trust between devices with no prior relationship, and finally the relevance of trusted computing technology to mobile security issues.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2020 ◽  
Vol 2 (3) ◽  
pp. 97-105
Author(s):  
Ravi Shankar Pandey ◽  
Vivek Srivastava ◽  
Lal Babu Yadav

Software Defined Network (SDN) decouples the responsibilities of route management and datatransmission of network devices present in network infrastructure. It integrates the control responsibility at thecentralized software component which is known as controller. This centralized aggregation of responsibilities mayresult the single point of failure in the case malicious attack at the controller side. These attacks may also affect thetraffic flow and network devices. The security issues due to such malicious attacks in SDN are dominating challengesin the implementation and utilization of opportunities provided by this new paradigm. In this paper we haveinvestigated the several research papers related to proposal of new research trends for security and suggestionswhich fulfil the security requirements like confidentiality, integrity, availability, authenticity, authorization,nonrepudiation, consistency, fast responsiveness and adaptation. We have also investigated the new future researchfor creating the attack free environment for implementing the SDN.


Sign in / Sign up

Export Citation Format

Share Document