Professional Documents
Culture Documents
whatever is required.
It may seem to be great having such mobile devices PDA Tablet Laptop Handheld Slate
which have simplified our lives but there are consequences
Mobile Devices
of such devices. Since it is a mobile device, it can be
snitched by a thieve who would sell the device or data or
both. Mobile devices have limitations compared to big ones
in terms of capability to defend against a cyber attack [1]. As
we keep our mobile device active all the time compared to User
C. The hardware of mobile computing reusability of components and scalability management. All
Hardware depends mainly on what services and features these benefits and characteristics made the three-tier
the mobile device will provide to its user. Whether it needs architecture very popular choice when developing an
high RAM (random access memory), high storage size, application inter or new-centric. As mentioned earlier, it is a
antenna strength, etc. three-tier architecture which are Presentation tier (user
interface), Application tier (logic), and Data tier (data). If the
user interface changes, the logic, and data remain the same
D. The software of mobile computing
unaffected and still functional. It is more suitable and
Software simply deals with mobile application effective specifically network client/server design.
requirements and characteristics. Mobile computing gives
users the ability to access data and services from everywhere C. Drawbacks of the Architecture
and anywhere. The data could be video, voice, and data
transmitted over the network through the mobile device The architecture may seem to be perfect but the
communication service. drawbacks of such architecture are great due to its
complexity. Thus, harder to maintain as the whole
architecture as it grows bigger and may get corrupted/broken.
E. The impact of mobile computing on people
Additionally, the high cost of implementing such architecture
Most defiantly, mobile computing has made things very and the server performance degrades due to having the
simple and people are more dependent as the technology application tier server wise dependent.
advances. Statistically speaking [4,5], mobile computing is
continuously inclining.
IV. RELATED WORKS
F. To conclude According to the International Journal of Research in
Computer Application & Management [11], discussing the
The reason behind the growth and dependence on mobile
bad practices of users using their smartphone. A research
computing is due to the most benefits of mobile computing
study was conducted to find out the user’s knowledge of the
which are Connectivity, social engagements, and
security threats that lurk the smartphone, understand the
personalization. Despite the worst drawback which is data
importance and the level of the security the user prefers and
theft and depending on the stolen data, it can be assessed on
advise what should be done. The research study was a
how critical the situation is.
mixture of both contained Quantitative and Qualitative
Research. The results of the study came back as many users
III. THE ARCHITECTURE have important data on their smartphones, preferred screen
The mobile computing architecture section has been lock was a pattern which is considered as a medium to low
broken to several points [6, 7, 8, 9, 10] to understand it security. Shockingly, not many have a SIM lock nor even
properly: know what SIM lock means. Users also by 95% install from
unknown sources which can lead to installing a gateway for
A. Definition information theft, spam, etc. And the majority do not have
antivirus installed nor Anti-theft application. The study also
Mobile computing is a three-tier architecture which showed that users do not read what permissions the
consists of the Presentation tier, Application tier, and Data application request rather they simply grant access. At last,
tier. The architecture is explained in Fig. 2 explains the majority did not know what IMEI is or its purpose. IMEI
furthermore about the architecture. is an abbreviation for International Mobile Equipment
Identity [12]. It is a unique number to differentiate each
Mobile Computing – Three-Tier Architecture device from another. It also helps in tracking the device if it
Tier-1 Tier-2 Tier-3 is stolen and to verify that it is your phone by comparing the
Network layer
Presentation Tier Application Tier Data Tier device’s IMEI number with the IMEI written in the receipt of
The business logic
This layer deals of the application,
The transmitted purchase or on the box.
Also known as the data is stored in the
only with the the functions and
user interface tier,
Deals with the user
communication as services, the
database and
retrieved,
On the other hand, Symantec Corp (the world leading
data to be language used and CyberSecurity) in their patent papers (Inventors: Kevin
Definition
Interface
technology is advancing towards that direction, it can be [2] R. Shah, "Mobile Computing And Architecture", Prezi, 2019.
viewed in [15, 16, 17] for further knowledge expanding. [Online]. Available: https://prezi.com/qucainxhi1l7/mobile-
computing-and-architecture/. [Accessed: 10- Feb- 2019].
[3] "The Benefits of Mobile Computing and How Data Is Accessed", The
V. CONCERNS Balance Small Business, 2019. [Online]. Available:
https://www.thebalancesmb.com/definition-of-mobile-computing-
Mobile computing has helped many people due to the 2533640. [Accessed: 10- Feb- 2019].
capability of accomplishing tasks while away from any fixed [4] E. Enge, "Mobile vs Desktop Usage in 2018: Mobile widens the gap",
device. This allowed unethical developers and hackers to Stone Temple, 2019. [Online]. Available:
take advantage of the situation and target these devices for https://www.stonetemple.com/mobile-vs-desktop-usage-study/.
information theft. After the theft, either the information is [Accessed: 14- Feb- 2019].
sold or demands a ransom to be paid in bitcoin currency [18]. [5] "Internet Statistics & Facts (Including Mobile) for 2019",
HostingFacts.com, 2019. [Online]. Available:
Aside from local theft where the device is stolen https://hostingfacts.com/internet-facts-stats/. [Accessed: 14- Feb-
physically. In such situation, it is rarely to be found again as 2019].
such thefts never have the intentions of returning the device [6] "3-Tier Architecture: A Complete Overview - JReport", JReport,
back to its owner and the data or the device or both are sold 2019. [Online]. Available: https://www.jinfonet.com/resources/bi-
defined/3-tier-architecture-complete-overview/. [Accessed: 10- Feb-
which if fallen in wrong hands, the stolen data may be 2019].
critical depending on its importance and its impact. For [7] PATEL, "Architecture of Mobile Computing", Slideshare.net, 2019.
instance, a bank manager kept blueprints and codes of the [Online]. Available:
bank on his phone that got stolen will cause great loss as the https://www.slideshare.net/jainikpatel12/architecture-of-mobile-
bank has to take precautions and change everything that may computing. [Accessed: 10- Feb- 2019].
have been compromised due to the theft. [8] "Unit 2 - Mobile Computing – Three Tier Architecture.", KDKCE,
2019. [Online]. Available: https://www.kdkce.edu.in/pdf/Unit-
As from the related work, people are not aware of what 2%20Mobile%20computing-Architecture.pdf. [Accessed: 10- Feb-
security features the mobile devices present and in case of 2019].
theft what can be done and should be done. Additionally, [9] C. Kambalyal, "3-tier architecture", vol. 2, 2010.
they are unaware of the third-party security softwares that [10] "5 Benefits of a 3-Tier Architecture - Izenda", Izenda, 2019. [Online].
also provide assistance. Moreover, they are unaware of many Available: https://www.izenda.com/blog/5-benefits-3-tier-
architecture/. [Accessed: 10- Feb- 2019].
risks linger their mobile device.
[11] S. Anyimah, M. Shrivas, J. Badu and T. Yeboah, "Users’
Consciousness And Practices Regarding Smartphone Security
VI. SOLUTIONS Threats, Vulnerabilities And Security Measures: A Research In The
Tarkwa-Nsuaem Municipality Of The Western Region, Ghana",
From the users’ side, they should be educated about International Journal of Research in Computer Application and
every mobile computing concern as well as how to secure Management, vol. 7, no. 11, 2017. Available:
their mobile devices very well and keeping it safe. In http://ijrcm.org.in/comapp/index.php. [Accessed 10 February 2019].
addition, the data stored on the mobile device where any [12] "What Is My Phone’s IMEI and What Is It For?", MakeUseOf, 2019.
sensitive data should not be stored in it. [Online]. Available: https://www.makeuseof.com/tag/phones-imei-
makeuseof-explains/. [Accessed: 10- Feb- 2019].
On the developers’ side would be to force security to the [13] Roundy, K., Hart, M. and Gates, C. (2018). US10003606B2 -
users regardless of what they want, the options “Skip” or Systems and methods for detecting security threats - Google Patents.
“Ask me later” should not be there. Anti-theft should be [online] Patents.google.com. Available at:
https://patents.google.com/patent/US10003606B2/en [Accessed 1
active immediately. Antivirus should be installed mandatory. Nov. 2018].
[14] "Internet Security Threat Report (ISTR) 2018 | Symantec",
VII. CONCLUSION Symantec.com, 2018. [Online]. Available:
https://www.symantec.com/security-center/threat-report. [Accessed:
People should be aware while using these devices to keep 14- Feb- 2019].
them safe and secure with mid to high encryption such that is [15] P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on
a complex pattern, pin or password, perhaps using biometrics Architecture and Computation Offloading", IEEE Communications
[19] or any security lock that the mobile device offers. Also, Surveys & Tutorials, vol. 19, no. 3, pp. 1628-1656, 2017. Available:
such devices should never have sensitive data or information 10.1109/comst.2017.2682318 [Accessed 10 February 2019].
that could compromise and complicate things, or even worse [16] M. Satyanarayanan, "A Brief History of Cloud Offload", ACM
which cause death. SIGMOBILE Mobile Computing and Communications Review, vol.
18, no. 4, pp. 19-23, 2015. Available: 10.1145/2721914.2721921
[Accessed 10 February 2019].
REFERENCES [17] L. Tong, Y. Li and W. Gao, "A hierarchical edge cloud architecture
for mobile computing", IEEE INFOCOM 2016 - The 35th Annual
IEEE International Conference on Computer Communications, 2016.
[1] K. Kauthamy, N. Ashrafi and J. Kuilboer, "Mobile Devices and Cyber Available: 10.1109/infocom.2016.7524340 [Accessed 10 February
Security - An Exploratory Study on User’s Response to Cyber 2019].
Security Challenges", Proceedings of the 13th International
[18] "Bitcoin - Open source P2P money", Bitcoin.org, 2019. [Online].
Conference on Web Information Systems and Technologies, 2017.
Available: https://bitcoin.org/en/. [Accessed: 14- Feb- 2019].
Available: 10.5220/0006298803060311 [Accessed 13 February
2019]. [19] "What is biometrics? - Definition from WhatIs.com", SearchSecurity,
2019. [Online]. Available:
https://searchsecurity.techtarget.com/definition/biometrics.
[Accessed: 10- Feb- 2019].