Abstract
In the previous two Chaps. 18 and 19, we dealt with wireless communication but restricted our discussion to sensor networks, wireless communication networks, and cellular networks. We discussed a good number of communication devices and their communication protocols. We also discussed the security problems, and we propose solutions in some cases. What we did not do is actually put all these devices and technologies together to create the current phenomenal mobile communication devices, and the technology is currently driving computing and communication. We are going to do this in this chapter and more. The last two decades have witnessed a revolution of sorts in communication spearheaded by the rapidly evolving technologies in both software and hardware. A mobile communication system consists of two or more of the following devices, running specifically developed software to sustain, for a period of time, a wireless communication link between them: mobile telephone, broadly construed here to include devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, as well as satellite telephones and e-mail appliances. Mobile communication systems are revolutionizing the world today, shrinking the world to between two or more small handheld mobile devices. The rapid changes in communication technologies, revolutionary changes in software, and the growth of large powerful communication network technologies all have eased communication and brought it to large swaths of the globe. The high-end competition between the mobile telecommunication operators resulting in plummeting device prices, the quickly developing smartphone technology, and growing number of undersea cables and cheaper satellites technologies are bringing Internet access to almost every one of the global rural poor faster than many had anticipated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
“ Everything you need to know about each Mobile OS (Operating System) – Parts1- 4.” http://www.fusedblog.com/everything-you-need-to-know-about-each-mobile-os-operating-system-part-1-of-4-series-40-symbian/.
Komisky, Mark., “Mobile Device Security II: Handheld Operating Systems”, Bluefire, http://www.datamation.com/mowi/article.php/3575316/Mobile-Device-Security-II-Handheld-Operating-Systems.htm.
Richard, Denis. “ Why Android Is So Popular?”, http://ezinearticles.com/?Why-Android-Is-So-Popular?&id=7011641.
By Byron Acohido http://www.enterprise-security-today.com/news/Mobile-Devices-Vulnerable-to-Attack/story.xhtml?story_id=0010003FAI65 , April 10, 2012 9:50AM
“2011 Mobile Threat Report”, https://www.mylookout.com/mobile-threat-report.
http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit.
C-Skills (July23, 2010) http://c-skills.blogspot.com/search?q=exploid.
C-Skills (July 15. 2010): http://c-skills.blogspot.com/.
“Android Malware DroidDream How it Works”, Lookout Mobile Security Blog (March 2011) http://blog.mylookout.com/2011/03/android-malware-droiddream-how-it-works.
“Types Of Bluetooth Hacks And Its Security Issues”, http://hassam.hubpages.com/hub/.
Mobile Devices Expose Company Data To Severe Vulnerabilities, http://www.prnewswire.com/news-releases/mobilisafe-study-details-vulnerability-risk-to-company-data-for-smbs-146647805.html.
Clint Adams, http://searchconsumerization.techtarget.com/tutorial/Mobile-device-security-overview.
Wekipedia, http://en.wikipedia.org/wiki/Mobile_device_management.
Richard Adhikari “ Encryption on the Go, Part 1”, TechNewsWorld, http://www.technewsworld.com/story/75245.html.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2013). Mobile Communication Systems and Related Security Issues. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_20
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4543-1_20
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4542-4
Online ISBN: 978-1-4471-4543-1
eBook Packages: Computer ScienceComputer Science (R0)