RECENT SECURITY ISSUES IN PERSONAL COMMUNICATION SYSTEM

Volume 1, Issue 1, October 2016     |     PP. 35-50      |     PDF (373 K)    |     Pub. Date: October 28, 2016
DOI:    473 Downloads     7428 Views  

Author(s)

QI ZHU, Department of Computer Science, University of Houston-Victoria

Abstract
Personal Communication System (PCS) designates a set of wireless communications capabilities that allows the combination of terminal mobility, personal mobility, and service profile management. PCS can provide users with an all-in-one wireless phone, paging, messaging, and data service through portable devices. However, mobile services relaxed security has effectively made device users a target for hackers; mobile users have become increasingly concerned with security risks. The need for security has never been more detrimental than it is now. In this paper, we present a survey on emerging security issues of personal communication system, such as virus, worm, phishing and many others. In addition, some real recent examples are studied and finally some security rules are given to PCS users.

Keywords
Security, personal communication, virus, worm, phishing, malware

Cite this paper
QI ZHU, RECENT SECURITY ISSUES IN PERSONAL COMMUNICATION SYSTEM , SCIREA Journal of Computer. Volume 1, Issue 1, October 2016 | PP. 35-50.

References

[ 1 ] Alazab, M., Venkatraman, S. Watters, P. and Alazab, A. (2012) Cybercrime: The Case of Obfuscated Malware. International Conference in Global Security Safety and Sustainability, pp. 204-211.
[ 2 ] Arora, M. (2012). How secure is AES against brute force attacks? Retrieved May 6, 2015 from http://www.eetimes.com/document.asp?doc_id=1279619
[ 3 ] Aycock, John (2006). Computer Viruses and Malware. Springer. p. 14. ISBN 978-0-387-30236-2.
[ 4 ] Bank, D. (2004). NEW VIRUS CAN TURN YOU INTO A SPAMMER; MYDOOM OPENS A'BACK DOOR'THAT HACKERS CAN ACCESS; SIGNING UP FOR SECURITY ALERTS. The Wall Street Journal, 1.
[ 5 ] Camenisch, J., Ortiz-Yepes, D. A., & Preiss, F. S. (2015). Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones. In Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ACM, pp. 37-48.
[ 6 ] Cheng, H., Wang, X., Huang, M., & Yang, S. (2008). A review of personal communications services. In Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for (pp. 616-621). IEEE.
[ 7 ] Crunkish (2015). Top Ten Most Destructive Computer Viruses of All Time. Crunkish.com. Retrieved 1 February 2015. Retrieved Jan 14, 2016 from http://crunkish.com/top-ten-worst-computer-viruses/
[ 8 ] Egners, A., Marschollek, B., & Meyer, U. (2012). Hackers in your pocket: a survey of smartphone security across platforms. RWTH Aachen University, Technical Report, AIB-2012-07, Aachen, DE.
[ 9 ] Fischer, I., Kuo, C., Huang, L., Frank, M. (2012). Short Paper: Smartphones: Not Smart Enough? Proc. 2nd ACM CCS Workshop on Security and Privacy in Mobile Devices.
[ 10 ] Foote, J & Ruggiero, P. (2015). Cyber Threats to Mobile Phones. Retrieved May 1, 2016 from https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
[ 11 ] Hillebrand, M. (2000). Mobile Phones Swapped by E-Mail Virus. In ecommercetimes.com. June 2000. http://www.ecommercetimes.com/story/3502.html
[ 12 ] Kalige, Eran, Darrell Burkey, and I. P. S. Director (2012). "A case study of eurograbber: How 36 million euros was stolen via malware." Versafe (White paper).
[ 13 ] Kang, et al, 2013. Anonymity, Privacy, and Security Online. Retrieved September 5, 2013 from http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/
[ 14 ] Keizer, G. (2005). CoolWebSearch tops spyware threat list.
[ 15 ] Kessem, L, Karlinsky, A. (2016) Android Malware about to get worse: GM bot source code leaked, IBM Security Intelligence, Retrieved Aug 30, 2016 from https://securityintelligence.com/android-malware-about-to-get-worse-gm-bot-source-code-leaked/ .
[ 16 ] Klein, B., Miller, T., & Zilles, S. (2005). Security issues for pervasive personalized communication systems. In Security in Pervasive Computing (pp. 56-62). Springer Berlin Heidelberg.
[ 17 ] Luo, X., & Warkentin, M. (2008). Developments and Defenses of Malicious Code. Encyclopedia of Multimedia Technology and Networking, 3.
[ 18 ] Laurila, J. K., Gatica-Perez, D., Aad, I., Bornet, O., Do, T. M. T., Dousse, O., ... & Miettinen, M. (2012). The mobile data challenge: Big data for mobile computing research. In Pervasive Computing (No. EPFL-CONF-192489).
[ 19 ] Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 2053951714541861.
[ 20 ] Martins, Eduardo José Valadar, et al. (2015) "A hands-on approach on botnets for a learning purpose." Retrieved Aug 25, 2016 from https://web.fe.up.pt/~jmcruz/ssi/trabs-als/final/G6T12-Botnets-final.pdf
[ 21 ] Moskovitch R., Elovici Y., Rokach L. (2008), Detection of unknown computer worms based on behavioral classification of the host, Computational Statistics and Data Analysis, 52(9):4544–4566, DOI 10.1016/j.csda.2008.01.028.
[ 22 ] National Institute of Standards and Technology (NIST 2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise (SP 800-124 Revision 1). http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf
[ 23 ] Peng, S., Wu, M., Wang, G. and Yu, S. (2014) Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computers & Security, pp. 92-103, no. 44.
[ 24 ] Ravi, S., Raghunathan, A., Potlapally, N., & Sankaradass, M. (2002, June). System design methodologies for a wireless security processing platform. In Proceedings of the 39th annual Design Automation Conference (pp. 777-782). ACM.
[ 25 ] Shin, Seungwon, and Guofei Gu. (2010) "Conficker and beyond: a large-scale empirical study." Proceedings of the 26th Annual Computer Security Applications Conference. ACM, pp. 151-160.
[ 26 ] Singh, R. K. & Asthana, A. (2012). Architecture of wireless network. International Journal of Soft Computing and Engineering (IJSCE), 2(1), 208-210.
[ 27 ] Skoudis, E., (2004). Infection mechanisms and targets. Malware: Fighting Malicious Code. Prentice Hall Professional. pp. 31–48. ISBN 978-0131014053.
[ 28 ] Seo, S. H., Yim, K., & You, I. (2012, August). Mobile malware threats and defenses for homeland security. In International Conference on Availability, Reliability, and Security (pp. 516-524). Springer Berlin Heidelberg.
[ 29 ] The Concept of Security. (2014). Retrieved April 30, 2015 from http://www.mttgroup.ch/how_it_works/
[ 30 ] Wang, C. (2013). 2013 Forrester Mobile Security Predictions. Retrieved May 4, 2015 from http://resources.idgenterprise.com/original/AST-0105400_2013_Forrester_Mobile_Sec.pdf
[ 31 ] Wiki (2014) Samsung Galaxy Back-door on Replicant, Retrieved Aug 25, 2016 from http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor.
[ 32 ] Zhou, S., Zhao, M., Xu, X., et. al, (2003) Distributed Wireless Communication System: a New Architecture for Future Public Wireless Access, IEEE Transactions on Communications, 41(3), pp 108-113.