DOI QR코드

DOI QR Code

Actual Condition and Issues for Mobile Security System

  • Published : 2007.12.31

Abstract

The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.

Keywords

References

  1. Check Point Software Technologies. Check Point Full Disk Encryption. http://www.checkpoint.com/products/datasecurity/pc/index.html
  2. Utimaco Safeware. SafeGuard PDA. http://americas.utimaco.com/safeguard_pda/
  3. JEAG. Japan Email Anti-Abuse Group(JEAG), http://www.jeag.jp/ (Japanese only), 2005
  4. Inc.) Shane Coursena (Senior Technical Consultant aKaspersky Lab. The future of mobile malware. ScienceDirect - Network Security, 2007(8):7-11, 2007 https://doi.org/10.1016/S1353-4858(07)70072-7
  5. Mikko Hypponen. Malware Goes Mobile. Scientific American Magazine 2006, pages 70-77, 2006
  6. David Dagon, Tom Martin, and Thad Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11-15, 2004 https://doi.org/10.1109/MPRV.2004.21
  7. Neal Leavitt. Mobile Phones: The Next Frontier for Hackers? Computer, 38(4):20-23, 4 2005 https://doi.org/10.1109/MC.2005.31
  8. David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, 2(3):40-48, 6 2004
  9. Wayne Jansen and Rick Ayers. Guidelines on Cell Phone Forensics. Recommendations of the National Institute of Standards and Technology, Special Publication 800-101, http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf, 5 2007
  10. Frank Adelstein. MFP: The Mobile Forensic Platform. International Journal of Digital Evidence (IJDE), 2(1), 2003
  11. Marwan Al-Zarouni. Mobile Handset Forensic Evidence: a challenge for Law Enforcement. In Proc. 4th Australian Digital Forensics Conference, 12 2006
  12. Marwan Al-Zarouni. Introduction to Mobile Phone Flasher Devices and Considerations for their Use in. Mobile Phone Forensics. In Proc. of 5th Australian Digital Forensics Conference, 12 2007
  13. Open Mobile Alliance. OMA Digital Rights Management V2.0. http://www.openmobilealliance.org/Technical/release_program/drm_v2_0.aspx,3 2006
  14. Airspan. Mobile Wimax Security. http://www.airspan.com/pdfs/WP_Mobile_WiMAX_Security.pdf, 2007
  15. WiMAX Forum. Mobile WiMAX . Part I: A Technical Overview and Performance Evaluation.http://www.wimaxforum.org/news/downloads/Mobile_WiMAX_Part1_Overview_and_Performance.pdf, 8 2006
  16. Taeshik Shon and Wook Choi. An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Proc. of First International Conference Network-Based Information Systems (NBiS 2007), Lecture Notes in Computer Science 4658, pages 88-97, 8 2007 https://doi.org/10.1007/978-3-540-74573-0_10
  17. Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, and Toshiaki Tanaka. Security Vulnerabilities and Solutions in Mobile WiMAX. IJCSNS International Journal of Computer Science and Network Security, 7(11):7-15, 11 2007
  18. H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Specification. RFC2093, http://ietf.org/rfc/rfc2093.txt, 7 1997
  19. H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, http://ietf.org/rfc/rfc2094.txt, 7 1997
  20. D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC2627, http://ietf.org/rfc/rfc2627.txt, 6 1999
  21. B. Weis, T. Hardjono, and H. Harney. The Group Domain of Interpretation. RFC3547, http://ietf.org/rfc/rfc3547.txt, 7 2003
  22. H. Harney, U. Meth, A. Colegrove, and G. Gross. GSAKMP: Group Secure Association Key Management Protocol. RFC4535, http://ietf.org/rfc/rfc4535.txt, 6 2006
  23. T. Hardjono and B. Weis. The Multicast Group Security Architecture. RFC3740, http://ietf.org/rfc/rfc3740.txt, 3 2004
  24. Chung Kei Wong and Mohamed Gouda and Simon S. Lam, "Secure Group Communications Using Key Graphs", "IEEE/ACM Trans. on Networking"

Cited by

  1. An enhanced security framework for reliable Android operating system vol.9, pp.6, 2016, https://doi.org/10.1002/sec.908
  2. Linear SVM-Based Android Malware Detection for Reliable IoT Services vol.2014, 2014, https://doi.org/10.1155/2014/594501
  3. A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition vol.5, pp.10, 2012, https://doi.org/10.1002/sec.511