A Review of Smartphone Security Challenges and Prevention

Abstract

With the invention of a powerful, portable and lightweight device called a smartphone, there has been a very high number of its usage and a subsequent rise in the security issues involved in using a smartphone. Smartphones have gone from being non-existent many years ago to being heavily relied upon by a lot of people globally. This is because it is highly functional and contains various features. It is used for many different things like internet banking, entertainment, ecommerce, communication, mathematical calculations and many other things. Various types of smartphones and their distinct features were also identified, with android smartphone, iPhones, Window and Symbian being the top popular types of Mobile devices. Irrespective of the type of smartphone, there is a lot of data stored on it and most of the data stored are sensitive and susceptible to attack. There are a number of causes for smartphone security issues which can vary based on the type of the smartphone. Some of these causes were identified to be outdated OS or third-party apps, use of public WiFi, low security network protocols, physical breach and convergence. There are many examples of the security issues of smartphones which includes; malware attack, phishing attacks, spyware, identity theft, data invasion and theft and OS exploits. In the research work, we looked into ways to prevent these security issues which include; timely updates of OS and third-party apps, use of secure WiFi, use of antivirus, authentication and authentication. Desk research involving the literature review of “Smartphone” and “Smartphone security challenges and prevention” journals and articles were used. The research paper aimed to provide a concise knowledge and clear understanding of smartphones, its security and the prevention of the security challenges and also highlight the preventive measures that could be put in place to secure smartphones.

Country : Nigeria

1 Ogundele Israel Oludayo2 Akinwole Agnes Kikelomo3 Adebayo Adeniran Adedeji4 Aromolaran Adewale Ayodeji

  1. Computer Technology Department, Yaba College of Technology, Yaba, Lagos, Nigeria
  2. Computer Technology Department, Yaba College of Technology, Yaba, Lagos, Nigeria
  3. Computer Technology Department, Yaba College of Technology, Yaba, Lagos, Nigeria
  4. Computer Technology Department, Yaba College of Technology, Yaba, Lagos, Nigeria

IRJIET, Volume 7, Issue 5, May 2023 pp. 234-245

doi.org/10.47001/IRJIET/2023.705030

References

  1. M. Sarwar and T. R. Soomro, “Impact of smartphone’s on society,” Eur. J. Sci. Res., vol. 98, no. 2, pp. 216–226, 2013.
  2. D. Singh Negi, “Using mobile technologies in libraries and information centers,” Libr. hi tech news, vol. 31, no. 5, pp. 14–16, 2014.
  3. O. O. Okediran, O. T. Arulogun, R. A. Ganiyu, and C. A. Oyeleye, “Mobile operating systems and application development platforms: A survey,” Int. J. Adv. Netw. Appl., vol. 6, no. 1, p. 2195, 2014.
  4. M. Z. Iqbal and A. G. Campbell, “From luxury to necessity: Progress of touchless interaction technology,” Technol. Soc., vol. 67, p. 101796, 2021.
  5. P. T. Mai and A. Tick, “Cyber Security Awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam,” Acta Polytech. Hungarica, vol. 18, no. 8, pp. 67–89, 2021.
  6. W. Ahmad, A. Rasool, A. R. Javed, T. Baker, and Z. Jalil, “Cyber security in iot-based cloud computing: A comprehensive survey,” Electronics, vol. 11, no. 1, p. 16, 2022.
  7. M. Ahmad and N. Musa, “Comparison between android and iOS Operating System in terms of security,” in Information Technology in Asia (CITA), 2013 8th International Conference on. IEEE, 2013, pp. 1–4.
  8. M. Goadrich and M. Rogers, “Smart smartphone development: iOS versus Android,” in Proceedings of the 42nd ACM technical symposium on Computer science education. ACM, 2011, pp. 607–612.
  9. L. Ma, L. Gu, and J. Wang, “Research and Development of Mobile Application for Android Platform,” Int. J. Multimed. Ubiquitous Eng., vol. 9, no. 4, pp. 187–198, 2014.
  10. J. Liu and J. Yu, “Research on Development of Android Applications,” in Fourth International Conference on Intelligent Networks and Intelligent Systems. IEEE, 2011, pp. 69–72.
  11. T. Grønli and J. Hansen, “Mobile application platform heterogeneity: Android vs Windows Phone vs iOS vs Firefox OS,” in Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on. IEEE, 2014, pp. 635–641.
  12. D. Tilson, C. Sørensen, and K. Lyytinen, “Change and control paradoxes in mobile infrastructure innovation: the Android and iOS mobile operating systems cases,” in System Science (HICSS), 2012 45th Hawaii International Conference on. IEEE, 2012, pp. 1324–1333.
  13. V. Remenar, S. Husnjak, and D. Peraković, “Research of Security Threats in the Use of Modern Terminal Devices,” in 23rd International DAAAM Symposium Intelligent Manufacturing & Automation: Focus on Sustainability, 2012.
  14. A.Maji and K. Hao, “Characterizing failures in mobile oses: A case study with android and symbian,” in Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on. IEEE, 2010, pp. 249–258.
  15. O. Riva and C. Qin, “Progressive Authentication: Deciding When to Authenticate on Mobile Phones.,” in Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)., 2012, pp. 301–316.
  16. P. Weichbroth and Ł. Łysik, “Mobile security: Threats and best practices,” Mob. Inf. Syst., vol. 2020, pp. 1–15, 2020.
  17. C. Shane-Simpson, A. Manago, N. Gaggi, and K. Gillespie-Lynch, “Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital,” Comput. Human Behav., vol. 86, pp. 276–288, 2018.
  18. ENISA: Critical Applications – Smartphone Security Top Ten Risks. https://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-applications/smartphone-security-1/top-tenrisks. May 2016.
  19. Kaspersky Lab: One in every six users suffers loss or theft of mobile devices, 21 October 2013. http://www.kaspersky.com/about/news/press/2013/one-in-every-six-users-suffer-lossor-theft-of-mobile-devices. July 2016.
  20. Denscombe, M.: The Good Guide Research Guide for Small-Scale Social Research Projects, 4th edn. Open University Press, Maidenhead (2010).
  21. L. Liu, X. Zhang, G. Yan, S. Chen, in Exploitation and Threat Analysis of Open Mobile Devices. Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (2009), pp. 20–29.
  22. R. Racic, D. Ma,H. Chen, ExploitingMMSvulnerabilities to stealthily exhaustmobile phone’s battery. Securecomm Workshops 2006, 1–10 (2006).
  23. N. Q. Mobile, “Mobile Security Report.” 2011.
  24. S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. Park, “Social network security: Issues, challenges, threats, and solutions,” Inf. Sci. (Ny)., vol. 421, pp. 43–69, 2017.
  25. E. F. E. Ahmet and M. B. KAPLAN, “Wi-fi security analysis for E&M-Government applications,” Int. J. Multidiscip. Stud. Innov. Technol., vol. 3, no. 2, pp. 86–98, 2019.
  26. H. Susanto, “Revealing cyber threat of smart mobile devices within digital ecosystem: User information security awareness,” in Data Integrity and Quality, IntechOpen, 2021.
  27. M.-L. Yao, M.-C. Chuang, and C.-C. Hsu, “Research on the User Attitudes and Behaviors of Mobile Security and Antivirus.”.
  28. S. Garg and N. Baliyan, “Comparative analysis of Android and iOS from security viewpoint,” Comput. Sci. Rev., vol. 40, p. 100372, 2021.
  29. B. Remneland-Wikhamn, J. A. N. Ljungberg, M. Bergquist, and J. Kuschel, “Open innovation, generativity and the supplier as peer: The case of iphone and android,” Int. J. Innov. Manag., vol. 15, no. 01, pp. 205–230, 2011.
  30. M. Talal et al., “Comprehensive review and analysis of anti-malware apps for smartphones,” Telecommun. Syst., vol. 72, pp. 285–337, 2019.
  31. A.Das and H. U. Khan, “Security behaviors of smartphone users,” Inf. Comput. Secur., vol. 24, no. 1, pp. 116–134, 2016.
  32. G. Jindal and M. Jain, “A comparative study of mobile phone’s operating systems,” Int. J. Comput. Appl. Inf. Technol., vol. 1, no. 3, pp. 10–15, 2012.
  33. M. Nosrati, R. Karimi, and H. A. Hasanvand, “Mobile computing: principles, devices and operating systems,” World Appl. Program., vol. 2, no. 7, pp. 399–408, 2012.
  34. J. West and D. Wood, “Evolving an open ecosystem: The rise and fall of the Symbian platform,” in Collaboration and competition in business ecosystems, Emerald Group Publishing Limited, 2014.
  35. T. Pitichat, “Smartphones in the workplace: Changing organizational behavior, transforming the future,” LUX A J. Transdiscipl. Writ. Res. from Claremont Grad. Univ., vol. 3, no. 1, p. 13, 2013.
  36. Z. Sitová, J. Šedˇenka, Q. Yang, G. Peng, G. Zhou, P. Gasti et al., HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11, 877–892 (2016).
  37. R. Neware, K. Ulabhaje, G. Karemore, H. Lokhande, and V. Dandige, “Survey on Security Issues in Mobile Cloud Computing and Preventive Measures,” in Smart Computing Paradigms: New Progresses and Challenges: Proceedings of ICACNI 2018, Volume 2, 2020, pp. 89–100.
  38. V. Moorthy, R. Venkataraman, and T. R. Rao, “Security and privacy attacks during data communication in software defined mobile clouds,” Comput. Commun., vol. 153, pp. 515–526, 2020.
  39. Security in Telecommunications and Information Technology: An Overview of Issues and the Deployment of Existing ITU-T Recommendations for Secure Telecommunications (2016), https://www.itu.int/itudoc/itu-t/85097.pdf
  40. US National Security Agency: Information Assurance (2016), http://www.nsa.gov/ia/ia_at_ nsa/index.shtml.online
  41. Webopedia, “Mobile security best practices,” 2020, https://www.webopedia.com/TERM/M/mobile_security_best_practices.html.
  42. F. Stroud, “Mobile security best practices,” 2020, https://www.webopedia.com/TERM/M/mobile_security_best_practices.html.
  43. H. Dowden, “-e 6 mobile device security best practices you should know in 2020,” 2020, https://www.ntiva.com/blog/top-5-mobile-device-security-best-practices-2020.
  44. D. Hein, “7 essential mobile security best practices for businesses,” 2020, https://solutionsreview.com/mobiledevice-management/7-essential-mobile-security-best-practicesfor-businesses/.
  45. S. Lerner, “Mobile device security best practices. How to protect portable technology,” 2020, https://www.Enterprisemobilityexchange.com/eme-security/articles/mobiledevice- security.
  46. J. Mark, “8 best practices for mobile device security,” 2020, https://www.jmark.com/8-best-practices-mobiledevice-security/.
  47. A.D. Kent, L. M. Liebrock, and J. C. Neil, “Authentication graphs: analyzing user behavior within an enterprise network,” Computers & Security, vol. 48, pp. 150–166, 2015.
  48. D. Dasgupta, A. Roy, and A. Nag, “Multi-factor authentication,” in Advances in User Authentication, pp. 1    85–233, Springer, Cham, Switzerland, 2017.
  49. H. Patel, “14 best practices for your mobile app security,” 2020, https://www.tristatetechnology.com/blog/bestpractices-to-improve-mobile-app-security/.
  50. M. Ciampa, Security Awareness: Applying Practical Security in Your World, Cengage Learning, Boston, MA, USA, 2013.
  51. K. Lab, “Best practices. Encryption,” 2020, https://media. kaspersky.com/pdf/b2b/Encryption_Best_Practice_Guide_2015.pdf.
  52. L. Phifer, “Best practices for improving mobile data security,” 2020, https://searchmobilecomputing.techtarget.com/tip/Best-practices-for-improving-mobile-data-security.
  53. A.S. K. Pathan, M. M. Monowar, and Z. M. Fadlullah, Building Next-Generation Converged Networks: Deory and Practice, CRC Press, Boca Raton, FL, USA, 2013.
  54. S. Abraham and I. Chengalur-Smith, “An overview of social engineering malware: trends, tactics, and implications,” Technology in Society, vol. 32, no. 3, pp. 183–196, 2010.
  55. D. Burley, R. Carpinella, D. Chesebrough et al., Cybersecurity in our Digital Lives, Vol. 2, Hudson Whitman/ECP, New York, NY, USA, 2015.
  56. V. K. Velu, Mobile Application Penetration Testing, Packt Publishing Ltd., Birmingham, UK, 2016.
  57. M. E. Vermaat, S. L. Sebok, S. M. Freund, J. T. Campbell, and M. Frydenberg, Discovering Computers 2018: Digital Technology, Data, and Devices, Nelson Education, Toronto, Canada, 2017.