Professional Documents
Culture Documents
Mary Komunte 1
• Introduction
– The last two decades have witnessed a revolution of sorts in
communication spearheaded by the rapidly evolving technologies in
both software and hardware.
– A mobile communication systems consists of:
• mobile telephone, broadly construed here to include devices based
on Code Division Multiple Access (CDMA), Time Division
Multiple Access (TDMA), Global System for Mobile
Communications (GSM),
• Wireless Personal Digital Assistants (WPDA) digital technologies
and follow-ons, as well as satellite telephones and email appliances.
– Mobile communication systems are revolutionising and shrinking the
world to between two or more small handheld mobile devices.
– Competition between the mobile telecommunication operators resulting
in plummeting device prices, the quickly developing smartphone
technology and growing number of undersea cables and cheaper
satellites technologies are bringing Internet access to almost every one
Mary Komunte 6
– Radio frequency identification (RFID) tags—An RFID tag consists
of a microchip and an antenna with typical ranges in size between a
postage stamp and a pager. Each tag stores a unique identification
number. An active RFID tag, which has its own power source, can
transmit identification information up to a mile away. A passive
RFID tag, which is activated by an external source of power, can
transmit information up to 20 or 30 ft
– Global system for mobile communications (GSM)—This provides
personalized services to cell phone subscribers based on their
current locations. A GSM uses several methods to find the location
of a subscriber, using the time taken by signals to travel between the
subscriber’s handset and the cellular network base stations. GSM
signals emitted by cell phones in vehicles can automatically report
their positions, travel time, traffic incidents, and road surface
problems [8].
Mary Komunte 7
Security Issues in Mobile Ecosystems
• As mobile devices, more importantly smart devices, become
ubiquitous, the risk for using them is increasing.
• They are increasingly holding and storing more private data
like personal and business and they are roaming in public
spaces on public networks with limited security and
cryptographic protocols to protect the data.
• Major threats to mobile devices include:
– Application-Based Threats
– Web-based Threats
– Network Threats
– Physical Threats
– Operating System Based Threats