PHONE
+86 186-9155-9092
Home / News / Security issues in mobile Computing

Security issues in mobile Computing

Views: 0     Author: Site Editor     Publish Time: 18-11-2022      Origin: Site

Mobile computing is the human-computer interaction in which a computer is expected to be carried around during normal use,allowing the transfer of data, voice, and video.Mobile computing involves mobile communications,mobile hardware and mobile software.Communications issues include ad-hoc and infrastructure networks as well as communication properties,protocols,data formats and specific technologies.Hardware includes mobile devices or device components.Mobile software deals with the characteristics and requirements of mobile applications.

Main principles

  • Portability: Connected devices/nodes within a mobile computing system should facilitate mobility.These devices may have limited device capabilities and limited power sources,but should have sufficient processing power and physical portability to operate in a mobile environment.

  • Connectivity: This defines the Quality of Service (QoS) of the network connection.In mobile computing systems,network availability is expected to remain high with minimal latency/downtime independent of the mobility of connected nodes.

  • Interactivity: Nodes belonging to mobile computing systems are connected to each other,communicate and collaborate through active data transactions. Rugged Mobile Computer-cilicoaidc

Personality: A portable device or mobile node connected to a mobile network typically represents an individual; mobile computing systems should be able to adopt this technique to address individual needs and obtain contextual information for each node.

Devices

  • Some of the most common forms of mobile computing devices are as follows:

  • Laptop computers,compact,lightweight units including full character set keyboards, primarily used as hosts for parameterizable software, eg laptops/desktops, smartphones/tablets, etc.

  •  Smart cards that can run multiple applications but are typically used for payment, travel and secure area access.

  • Mobile phones, telephone devices that can make long-distance calls over cellular network technology.

  • Wearable computers, mainly limited to function keys, are mainly used to integrate software agents, such as bracelets, keyless implants, etc.

  • These courses are expected to persist and complement each other, with no one completely replacing the other.

  • Other types of mobile computers have been introduced since the 1990s, including:

  • Laptops (discontinued).

  • Personal Digital  Assistant/Enterprise Digital Assistant (discontinued)

  •  Ultra Mobile PC (discontinued).

  • Laptop.

  • Smartphones and tablets.

  •  Wearable computer.

  •  E-reader

  • Computer

Limitations

Scalability, replaceability and modularity: Compared to common traditional motherboard-based PCs, the SoC architecture embedded in them makes these functions impossible, ack of BIOS: Since most smart devices lack a proper BIOS, their bootloading capabilities ar limited as they can only boot to the single operating system that comes with them, in stark contrast to the PC BIOS model.Range and Bandwidth: Mobile Internet access is typically slower than direct cable connections using technologies such as GPRS and EDGE, and more recently HSDPA, HSUPA, 3G and 4G networks,and proposed 5G networks.These networks are usually available within a series of commercial cell phone towers. High-speed networking .Wireless LAN is inexpensive but has a very limited range.Security Standards: Relying  on public networks while working on the go requires careful use of VPNs.Security is a major concern when considering mobile computing standards for fleets.A large number of networks interconnected by wires can easily attack VPNs. Power Consumption: When power outlets or portable generators are not available, mobile computers must run entirely on battery power.Combined with the compact size of many mobile devices, this often means that unusually expensive batteries must be used to achieve the necessary battery life.

Transmission Interference: Weather, terrain, and distance to the nearest signal point can interfere with signal reception. Reception is generally poor in tunnels, some buildings and rural areas. Potential health hazards: People who use mobile devices while driving are often distracted and are therefore considered more likely to be involved in an accident. While this may seem obvious, there is much discussion about whether banning the use of mobile devices while driving would reduce accidents.Cell phones may interfere with sensitive medical equipment. Questions were raised about cell phone radiation and health. Human-machine interface with the device: Screens and keyboards tend to be small, which can make them difficult to use.Alternative input methods such as speech or handwriting recognition require training.

Security issues involved in mobile

Mobile security is becoming increasingly important in mobile computing.This is of particular concern as it relates to the security of personal information now stored on smartphones.Mobile applications may copy user data from these devices to remote servers without the user's permission, and often without the user's consent.User profiles automatically created in the cloud for smartphone users raise privacy concerns across all major platforms, including but not limited to location tracking and personal data collection, regardless of user settings on the device.More and more users and businesses use smartphones to plan and organize their work and private lives. Within companies, these technologies are causing profound changes in the organization of information systems, so they have become a source of new risks. In fact, smartphones collect and edit an increasing amount of sensitive information, access to which must be controlled to protect the privacy of users and the intellectual property of companies.All smartphones are preferred targets.These attacks exploit weaknesses associated with smartphones, which can come from WiFi networks and wireless telecommunications methods such as GSM.There are also attacks that exploit software vulnerabilities from web browsers and operating systems.Finally, there are malware that rely on the weak knowledge of ordinary users.Different security countermeasures are being developed and applied to smartphones, from the security of different software layers to the dissemination of information to end users. Good practice needs to be adhered to at every level, from design to usage, to the development of operating systems, software layers and downloadable applications

Mobile data communication

Wireless data connections used in mobile computing take three general forms. Cellular data services use technologies GSM, CDMA or GPRS, 3G networks such as W-CDMA, EDGE or CDMA2000, and more recently 4G and 5G networks.These networks are usually available within range of commercial cell phone towers. Wi-Fi connections offer higher performance,and can be accessed on private commercial networks or via public hotspots, with a typical range of 100 feet indoors and 1000 feet outdoors.Satellite Internet access covers areas where cellular and Wi-Fi are unavailable, and can be placed anywhere the user can see satellite locations,for satellites in geostationary orbit, this means This allows for an unobstructed view of the southern sky.Some enterprise deployments combine networks from multiple cellular networks, or mix cellular, Wi-Fi, and satellite networks.When using hybrid networks, mobile virtual private networks (mobile VPNs) not only address security concerns, but also automate multiple network logins and keep application connections active to prevent during network transitions or loss of coverage crash or data loss.