Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30075
Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: Embedded computing, internet of things, mobile computing, and wireless technologies.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1316845

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 372

References:


[1] Qi, Han, and Abdullah Gani. "Research on mobile cloud computing: Review, trend and perspectives." In Digital Information and Communication Technology and it's Applications (DICTAP), 2012 Second International Conference on, pp. 195-202. IEEE, 2012.
[2] Asokan, N. "Security issues in mobile computing." (1994).
[3] Urbas, Gregor, and Tony Krone. Mobile and wireless technologies: security and risk factors. Australian Institute of Criminology, 2006.
[4] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. “Internet of Things (IoT): A vision, architectural elements, and future directions” Future generation computer systems 29, no. 7 (2013): 1645-1660.
[5] Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1, no. 1 (2014): 3-9.
[6] Yan-rong, Shi, and Hou Tao. "Internet of Things key technologies and architectures research in information Processing." In Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013). 2013.
[7] Yousuf, Tasneem, Rwan Mahmoud, Fadi Aloul, and Imran Zualkernan. "Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures." (2015).
[8] Kamilaris, Andreas, and Andreas Pitsillides. "Mobile phone computing and the Internet of Things: A survey." IEEE Internet of Things Journal 3, no. 6 (2016): 885-898.
[9] Adat, Vipindev, and B. B. Gupta. "Security in Internet of Things: issues, challenges, taxonomy, and architecture." Telecommunication Systems (2017): 1-19.
[10] Khattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RFID Security Threats and Basic Solutions." In RFID Security, pp. 27-41. Springer International Publishing, 2017.
[11] Desmedt, Yvo. "Man-in-the-middle attack." In Encyclopedia of cryptography and security, pp. 759-759. Springer US, 2011.
[12] Mirkovic, Jelena, Sven Dietrich, David Dittrich, and Peter Reiher. "Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)." (2004).
[13] Schwartz, Paul M. "Property, privacy, and personal data." Harv. L. Rev. 117 (2003): 2056.
[14] Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13, no. 18 (2013): 1587-1611.
[15] Yasham Singhal, Saloni Singh, Varsha Mathpal. Security Challenges in Mobile Computing. Vol 3, Issue1, Jan – March 2015.
[16] Wheat, Jeffrey, Randy Hiser, Jackie Tucker, Alicia Neely, and Andy McCullough. Designing a wireless network. Syngress Publishing, 2001.
[17] Ahonen, Pasi, Juhani Eronen, Jarkko Holappa, Jorma Kajava, Tiina Kaksonen, Kati Karjalainen, Kaarina Karppinen et al. "Information security threats and solutions in the mobile world." VTT Research Notes (2005): 1-108.
[18] Vermesan, Ovidiu, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert et al. "Internet of things strategic research roadmap." Internet of Things-Global Technological and Societal Trends 1 (2011): 9-52.
[19] Mendez, Diego M., Ioannis Papapanagiotou, and Baijian Yang. "Internet of Things: Survey on Security and Privacy." arXiv preprint arXiv: 1707.01879 (2017).