Verified Document

Mobile Devices Networking Performance And Security Related Issues Research Paper

Related Topics:

Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted. Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission and reception and therefore simplify the process of data interception. Malware is an additional problem regarding mobile device networks. It is simple for mobile device users to download malware through games and security patches and also through online advertisements. Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue. Usually, mobile devices lack such software unlike computer devices. Furthermore, users fail to perceive the need for installation. Consequently, this increases the security risk of attacks. What is more, in the event that operating systems might be outdated implies that it is easy for attackers to intercept data using different malware. Performance issues are also a prevalent problem in mobile device networks. For starters, bearing in mind that TCP flow control mechanisms were meant for wired environments, then transitory dilapidations on the air interface of radio access systems might result in pointless deteriorations in performance. There is also the performance problem of latency in mobile networks. This take into account the greater period of time in which it takes a mobile device’s source to send or convey pack of data to a particular receiver. The increased use of internet and increased mobile apps facilitates poor latency.
Index Terms – Mobile Device, Network Security, Performance

I. Introduction

Over the years, the requirements for mobile networks have transformed and shifted from single-purpose networks to multi-purpose networks. A mobile networking system comprises of two or more different kinds of devices running specifically advanced software to maintain, for a period of time, a wireless communication linkage between them. These devices consist of mobile telephone, generally encompass devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, in addition to satellite telephones and e-mail appliances [1]. Without a doubt, the mobile networking systems have facilitated significant revolution of the world in the present day, dwindling the world that exists between two or more mobile devices. The fast-paced changes and transformations in networking technologies, ground-breaking changes in software, and the development of great influential communication network technologies all have improved communication and brought it to enormous wrappings of the world. Nonetheless, there are major problems linked to mobile devices networking owing to advanced technology [1]. The main objective of this paper is to examine the issues of security and performance as associated to mobile device networking.

II. REVIEW OF LITERATURE

A. SECURITY PROBLEMS

Mobile networking and communication has come to be a pivotal aspect of everyday life. For instance, statistics indicate that at the onset of the 2017 fiscal year, the mobile network consisted of just about 5 billion users. A major and diverse mobile communication and application ecosystem has emanated in the past years. In the past number of decades, several security, performance and privacy issues in mobile network generations have been disclosed that threaten users in addition to network providers [2]. Security attacks can be categorized into two kinds including active attacks and passive attacks. In regard to the latter, the attackers try to learn or capitalize on the information from legitimate users but do not aim to attack the communication itself. The most common kinds of these passive attacks within a mobile network include traffic analysis and eavesdropping [3].

Eavesdropping is an attack that is employed by an inadvertent receiver to interrupt a message from others. It is imperative to note that encryption of the signals over the radio link...…of everyday lives owing to the reason that they facilitate users to gain accessibility to a wide range of universal and pervasive services. The findings of the research undertaken indicate that there are significant security and performance problems associated with mobile device networks. Three key security issues include the lack of encryption, lack of security software and the existence of malware. Imperatively, developers make use of encryption processes that already have known susceptibilities to accelerate the process of mobile device app development and the outcome is that any driven attacker can crack passwords and gain accessibility [9]. Secondly, malware is a major security issue for mobile device networks. Notably, mobile device applications as well as the use of online advertisements, it has become increasingly easy for users to become attacked by malware on their mobile devices and therefore leading to simple interception of data. The lack of proper encryption gives rise to simple interception thereby facilitating unauthorized accessibility to sensitive information. Research findings also indicate that lack of data encryption by numerous applications facilitate the ease with which data interruption can take place within mobile device networks.

IV. CONCLUSION

In conclusion, mobile network communication has progressed to be a pivotal aspect of everyday human life. Aside from capitalizing mobile devices for voice communication, it is presently conceivable to have increased accessibility to the internet, undertake financial transactions, and send emails as well as text messages through the use of mobile devices. The inference of this is that aspects such as security and performance play a significant part. It is imperative to deal with security issues through encryption of mobile devices and apps. This will facilitate the difficulty with which attackers will be able to intercept data. The installation of security software within mobile phones and also assessing the kind of apps and files being downloaded can increase the security of a network. This is bound to diminish the likelihood of malware entering a mobile device network and therefore it becomes challenging for data interception to take place.

REFERENCES

[1]…

Cite this Document:
Copy Bibliography Citation

Related Documents

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Mobile Adhoc Networks Manet the
Words: 3549 Length: 13 Document Type: Research Proposal

Much work remains to enable a seamless Integration, for example that can extend IP to support mobile network devices. (Chlamtac, Conti, and Liu, 2003) 4G is stated to begin with the assumption "that future networks will be entirely packet-switched, using protocols evolved from those in use in today's Internet." (Chlamtac, Conti, and Liu, 2003) It is reported that a 4G wireless network that is all IP-based "has intrinsic advantages over its

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Job Portal Security the Objective
Words: 3023 Length: 11 Document Type: Term Paper

XML is used not only to represent the data but also as a messaging protocol called SOAP; and (6) Portal Integration is another popular integration methodology in use today. It doesn't involve expensive and time consuming technologies and processes that EAI and data warehousing require. Also, it is the most customer-facing of all the methods described in this section. This means that it can be highly personalized and customized

Wireless Networking
Words: 12201 Length: 44 Document Type: Term Paper

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Tablet Devices Replace the Latop
Words: 16026 Length: 55 Document Type: Dissertation

It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now