Mobile Communication: Implication Issues

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-49 Number-1
Year of Publication : 2017
Authors : Bandela Vishnuvardhan, Dr. B. Manjula
DOI :  10.14445/22312803/IJCTT-V49P102

MLA

Bandela Vishnuvardhan, Dr. B. Manjula "Mobile Communication: Implication Issues". International Journal of Computer Trends and Technology (IJCTT) V49(1):9-14, July 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Mobile communication devices having a place with the GSM (Global System for Mobile Communications) organize ended up noticeably fit for sending and receiving instant messages. As these communication devices developed, they wound up noticeably smart, small and more features were included, for example, MMS (multimedia messaging service), which enabled users to send and get pictures. A mobile phone with highly advanced features is called a smart phone. In this paper, we carried a study on Mobile technology, services, different types of operating system, security attack (threats, malware, phishing, etc…) and various mobile network attacks.

References
[1] M. Kotadia, “Major smartphone worm by 2007,” Gartner Study, June, 2005.
[2] Mariantonietta La Polla, Fabio Martinelli, and Daniele Sgandurra, “A Survey on Security for Mobile Devices”, 1553-877X/12, IEEE, 2012.
[3] Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis: “Smartphone security evaluation - the malware attack case” pp. 25-36, SciTePress, Spain, July 2011.
[4] Cassandra Beyer, “Mobile Security: A Literature Review”, IJCA(0975-8887), vol 97-no.8, July 2014.
[5] Yong Wang, Karthik Vangury, Jason Nikolai, “MobileGuardian: A Security Policy Enforcement Framework for Mobile Devices”, 978-1-4799-5158, IEEE, 2014.
[6] Ala Eshmawi &Suku Nair, “Smart Apllication Security: Survey of New Vector and Solutions”, 978-1-4799-0792-2/13, IEEE, 2013.
[7] N. Boudriga, “Security of Mobile Communications”. Taylor and Frances Group, 2010.
[8] Sabina Barakovic, Ena Kurtovic, Olja Bozanovic Anes, Jasmina Barakovic Husic, “Security Issuses in Wireless Networks: An Overview”, 978-1-5090-2902-0/16, IEEE, 2016.
[9] Akhil Gupta, Rakesh Kumar Jha, “A Survey of 5G Network: Architecture and Emerging Technologies”, 2169-3536, IEEE, 2015.
[10] Ting Zhao, Gang Zhang, Lei Zhang, “An Overview of Mobile Devices Security Issues and Countermeasures”, 978-1-4799-7091-9/14, IEEE, 2014.
[11] R.Lakshman Naik, S.S.S.V.N Sarma, “ A Framework for Mobile Cloud Computing”, IJCNWMC, vol.3-2013.
[12] Dr. V. Harsha Shastri, V.Sreeprada, K.Anitha "Mobile Computing – challenges in Wireless LANs and Mobile Ad hoc Network". International Journal of Computer Trends and Technology (IJCTT) V42(3):141-145, December 2016.
[13] R Lakshman Naik, B Manjula, M Rajendra Prasad, “Dynamic Computation of the Application between Smart Mobile Device and Cloud Computing”, IJCET-2014
[14] V Bapuji, SSVN Sharma, R Lakshman Naik, D Ramesh, B Manjula, “Quality of service for mobile Ad-hoc wireless networks”, IJCSE, 2011, pp:1573-1577.
[15] Durga Puja, Raghav Mehra, BD Mazumdar "Context Provisioning for Mobile Service Ensembles". International Journal of Computer Trends and Technology (IJCTT) V37(2):46-54, July 2016.

Keywords
Attacks, Mobile, Networks, Operating System, Security Challenges, Smartphone and Services.