Mobile Devices and Protocols
Min Song, Old Dominion University
Introduction
Mobile Device Families
Mobile Handsets
Mobile PCs
Mobile Protocols
Peer-to-Peer Protocols
Client/Server Protocols
Mobile Devices Security and Measures
Security Attacks on Mobile Devices
User-Mobile Level Security Measures
Mobile Data and Applications Level Security Measures
Network Communications Level Security Measures
Mobile Device Mobility Management
Handoff Management
Location Management
Roaming Management
Conclusions and Future Trends
Glossary
Cross References
References
INTRODUCTION
Mobile devices are used for information generation, delivery, storage, and management; they can be carried and moved with ease. The mobile device market has extremely heterogeneous brands. They range from simple cellular phones to powerful laptop PCs. Generally speaking, however, they share similar physical characteristics, such as small screen size, short battery lifetime, limited input/output capability, limited computing power, and low network bandwidth. Nevertheless, mobile devices have become one of the fastest growing segments of the computer industry and will become the predominant medium for Internet access. There are two primary reasons for this trend. First, people want to communicate anytime and anywhere; and second, the rapid growth of wireless local area networks (WLAN) and new wireless transmission technologies have enabled higher connectivity.
This chapter provides an overview of two mobile device families. ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.