Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic...
Introduction Ever wondered how powerful speakers and writers make their words so compelling? Rhetorical devices are linguistic techniques designed to enhance persuasion and leave your audience with an impact they will not forget. You know that expression, “The pen is mightier than...
Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted.
Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission and reception and therefore simplify the process of data interception. Malware is an additional problem regarding mobile device networks. It is simple for mobile device users to download malware through games and security patches and also through online advertisements. Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue. Usually, mobile devices lack such software unlike computer devices.
Furthermore, users fail to perceive the need for installation. Consequently, this increases the security risk of attacks. What is more, in the event that operating systems might be outdated implies that it is easy for attackers to intercept data using different malware. Performance issues are also a prevalent problem in mobile device networks. For starters, bearing in mind that TCP flow control mechanisms were meant for wired environments, then transitory dilapidations on the air interface of radio access systems might result in pointless deteriorations in performance.
There is also the performance problem of latency in mobile networks. This take into account the greater period of time in which it takes a mobile device’s source to send or convey pack of data to a particular receiver. The increased use of internet and increased mobile apps facilitates poor latency. Index Terms – Mobile Device, Network Security, Performance I. Introduction Over the years, the requirements for mobile networks have transformed and shifted from single-purpose networks to multi-purpose networks.
A mobile networking system comprises of two or more different kinds of devices running specifically advanced software to maintain, for a period of time, a wireless communication linkage between them. These devices consist of mobile telephone, generally encompass devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, in addition to satellite telephones and e-mail appliances [1].
Without a doubt, the mobile networking systems have facilitated significant revolution of the world in the present day, dwindling the world that exists between two or more mobile devices. The fast-paced changes and transformations in networking technologies, ground-breaking changes in software, and the development of great influential communication network technologies all have improved communication and brought it to enormous wrappings of the world. Nonetheless, there are major problems linked to mobile devices networking owing to advanced technology [1].
The main objective of this paper is to examine the issues of security and performance as associated to mobile device networking. II. REVIEW OF LITERATURE A. SECURITY PROBLEMS Mobile networking and communication has come to be a pivotal aspect of everyday life. For instance, statistics indicate that at the onset of the 2017 fiscal year, the mobile network consisted of just about 5 billion users. A major and diverse mobile communication and application ecosystem has emanated in the past years.
In the past number of decades, several security, performance and privacy issues in mobile network generations have been disclosed that threaten users in addition to network providers [2]. Security attacks can be categorized into two kinds including active attacks and passive attacks. In regard to the latter, the attackers try to learn or capitalize on the information from legitimate users but do not aim to attack the communication itself. The most common kinds of these passive attacks within a mobile network include traffic analysis and eavesdropping [3].
Eavesdropping is an attack that is employed by an inadvertent receiver to interrupt a message from others. It is imperative to note that encryption of the signals over the radio link is most frequently utilized to combat against the eavesdropping attack. In this case, the eavesdropper is unable to interrupt the received signal in a direct manner as a result of the encryption.
Traffic analysis is also an attack where an inadvertent receiver utilized to interrupt information for instance location and individuality of the communication parties by examining the traffic of the received signal devoid of comprehending the content of the signal itself. Basically, this implies that even when the signal is encoded, traffic analysis can still be utilize to disclose the patterns of the communication parties. Imperatively, these passive attacks purpose to undertake the violation of data confidentiality and user privacy.
On the other hand, active attacks can encompass the modification of data or the intrusion of legitimate communications. The common active attacks comprise of denial of service (DoS), man in the middle attack (MITM), distributed denial of service (DDoS) attack and replay attack [3] Lack of encryption is another security issue for mobile device networks. It is imperative to note that wireless transmissions are not encoded at all times. Different sorts of information, for instance, e-mails, sent through a mobile device is more often than not unencrypted while in transit.
What is more, numerous applications fail to encode the data they transmit as well as receive over the network, and as a result make it simple for the data to be interrupted. For instance, if an application is transmitting data through a Wi-Fi network that lacks encryption using http, then it is considerably simple for the data to be intercepted. Imperatively, there can be easy interception of data in the event where a wireless transmission is not encoded [4]. Security problems impacting mobile device networks also include malware and security software.
Whilst using mobile devices, it is very easy for consumers to download applications that consist of malware. Furthermore, this is a major security concern as the users do it unintentionally in different forms such as games, utilities, security patches as well as beneficial applications. In the contemporary, it is challenging for users to ascertain the dissimilarity between genuine applications for mobile devices and those that comprise of malware.
A fitting instance is that a mobile device application could be repackaged with malware and thereby a user could accidentally download it to a mobile device. As a consequence, interruption of data is conceivable. The lack of encryption implies that the data can be easily interrupted by eavesdroppers, who might attain unsanctioned accessibility to sensitive information. Furthermore, mobile devices usually lack security software. Numerous of these devices usually lack pre-installed security software to facilitate safeguarding against malicious palpations, malware and spyware-based attacks.
What is more, the users do not usually partake in the installation of security software, largely owing to the reason that mobile devices fail to come with software that is preloaded. Whereas this sort of software might lead to slow mobile device operations and impact its battery life, devoid it, the risk might be amplified that an attacker could efficaciously distribute malware such as spam, Trojans, spyware and viruses to attract users into disclosing passwords or other confidential information [5]. B.
PERFORMANCE PROBLEMS Owing to the evolution of mobile technology together with the development of terminals such as smart phones, the accessibility of internet based applications has been largely undertaken over the Transmission Control Protocol, which in turn have come to be prevailing on mobile platforms.
Nonetheless, owing to the fact that the Transmission Control Protocol flow control mechanisms were intended for wired settings, short-term degradations on the air interface of radio access systems might give rise to needless declines in performance [6].Transmission Control Protocol freeze is deemed to be a conceivable solution to enhance these sorts of circumstances by activating the persist mode of the Transmission Control Protocol sender, precluding Transmission Control Protocol breaks and rate reductions in the course of poor radio conditions. Another issue associated with mobile networking performance is latency.
In spite of the fact that progress and advancement has been made in the past number of years, the decreases to network latency have not been in line with the increases in speed. As a result of this particular disparity, it is latency and not throughput, which is more often than not the aspect restricting the performance of network transactions. Latency signifies the time necessitated for a data packet to transit across a network or a sequence of networks.
Notably, mobile networks expand the latencies that are already existent in most internet-based communications by a number of factors, comprising of network type or circumstance [7]. If the performance of a mobile device network is not at its optimum and maximum level, this can directly give rise to poor performance and bad user experience. Different negative aspects regarding this include inadequate bandwidth, dropped phone calls, restricted access, reduction of the audio bandwidth in addition to sluggish response times for data downloads.
Taking this into consideration, network performance is a key aspect for mobile device users. One of the key performance problems is mobile device updates. Usually, as the operating systems in which applications run on become outdated, they also end up being more resource laden as they are incessantly updated in order to gain an advantage from the up-to-date and greatest hardware. Therefore, performances of the networks end up being sluggish owing to the out datedness of the devices. The mobile device network performance is also significantly impacted by memory.
The memory of the mobile device can become filled up as a result a significant backlog of applications, numerous videos and photos and also app cache files. Consequently, these elements give rise to a slowdown in the networking system. This is usually referred to as fragmentation and takes place more often than not owing to failed memory [8]. III.
FINDINGS In the contemporary setting, mobile devices are a significant part of everyday lives owing to the reason that they facilitate users to gain accessibility to a wide range of universal and pervasive services. The findings of the research undertaken indicate that there are significant security and performance problems associated with mobile device networks. Three key security issues include the lack of encryption, lack of security software and the existence of malware. Imperatively, developers make use of encryption processes that already have known susceptibilities to accelerate the process of mobile.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.