Mobile Devices and Protocols

Min Song, Old Dominion University

Introduction

Mobile Device Families

Mobile Handsets

Mobile PCs

Mobile Protocols

Peer-to-Peer Protocols

Client/Server Protocols

Mobile Devices Security and Measures

Security Attacks on Mobile Devices

User-Mobile Level Security Measures

Mobile Data and Applications Level Security Measures

Network Communications Level Security Measures

Mobile Device Mobility Management

Handoff Management

Location Management

Roaming Management

Conclusions and Future Trends

Glossary

Cross References

References

INTRODUCTION

Mobile devices are used for information generation, delivery, storage, and management; they can be carried and moved with ease. The mobile device market has extremely heterogeneous brands. They range from simple cellular phones to powerful laptop PCs. Generally speaking, however, they share similar physical characteristics, such as small screen size, short battery lifetime, limited input/output capability, limited computing power, and low network bandwidth. Nevertheless, mobile devices have become one of the fastest growing segments of the computer industry and will become the predominant medium for Internet access. There are two primary reasons for this trend. First, people want to communicate anytime and anywhere; and second, the rapid growth of wireless local area networks (WLAN) and new wireless transmission technologies have enabled higher connectivity.

This chapter provides an overview of two mobile device families. ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.