Date of Publication :23rd April 2018
Abstract: Mobile phones were used exclusively for calls and messages many years ago. Mobile phone use has growing in a major way in the last decade. They have become more strong and advanced.They've come to call themselves smartphones. The smartphone has been highly popular among the human community thanks to its wide range of applications. The smartphone is gradually taking role of laptops and has begun to compete with computers for efficiently performing various user tasks. In addition to communication, the smartphone assists user activities by performing many tasks.The advances in technology in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WI-MAX and Wi-Fi have made mobile phones a necessary part of everyday lives. Mobile phones have also become smart, allowing users to perform on - the-go routine tasks.Author's contribution, in this paper is twofold. First, with a particular focus on smartphones, they review the threats, vulnerabilities, attacks and their solutions. Attacks are divided into two groups, namely old attacks and new attacks. With this classification, they aim to provide a quick and concise view of various attacks and possible smartphone enhancement solutions.
Reference :
-
- L. Flynn and W. Klieber, “Smartphone Security,” IEEE Pervasive Comput., 2015, doi: 10.1109/MPRV.2015.67.
- A. Das and H. U. Khan, “Security behaviors of smartphone users,” Inf. Comput. Secur., 2016, doi: 10.1108/ICS-04-2015-0018.
- P. Faruki et al., “Android security: A survey of issues, malware penetration, and defenses,” IEEE Commun. Surv. Tutorials, 2015, doi: 10.1109/COMST.2014.2386139.
- J. Joshi and C. Parekh, “Android smartphone vulnerabilities: A survey,” in Proceedings - 2016 International Conference on Advances in Computing, Communication and Automation, ICACCA 2016, 2016, doi: 10.1109/ICACCA.2016.7578857.
- P. Mach and Z. Becvar, “Mobile Edge Computing: A Survey on Architecture and Computation Offloading,” IEEE Communications Surveys and Tutorials. 2017, doi: 10.1109/COMST.2017.2682318.
- P. Gilski and J. Stefanski, “Android OS: A Review,” TEM J., 2015.
- Tutorial Point, “Android Tutorial,” Android, Tutor. Point, 2014.
- T. Apple et al., “Apple iOS,” Apple, 2012. .
- S. Farhan, M. Ali, M. Kamran, Q. Javaid, and S. Zhang, “A Survey on Security for Smartphone Device,” Int. J. Adv. Comput. Sci. Appl., 2016, doi: 10.14569/ijacsa.2016.070426.
- C. Beyer, “Mobile Security: A Literature Review,” Int. J. Comput. Appl., 2014, doi: 10.5120/17025-7315.