Free Essay

Mobile Computing

In:

Submitted By NYCNative68
Words 4692
Pages 19
Security Issues in Mobile Computing
Srikanth Pullela
Department of Computer Science
University of Texas at Arlington
E-mail: pvssrikath@hotmail.com
Abstract
In the present mobile communication environment, lot of research is going on, to improve the performance of issues like handoffs, routing etc. Security is another key issue that needs to be considered, which comes into picture once the communication channel is setup. Many security protocols are being proposed for different applications like Wireless
Application Protocol, 802.11 etc. most of them are based on the public and private key cryptography. This paper provides an insight on these cryptographic protocols and also looks into the current research project going on at Sun Microsystems Lab on wireless security. 1.Introduction
With the rapid growth in the wireless mobile communication technology, small devices like PDAs, laptops are able to communicate with the fixed wired network while in motion. Because of its flexibility and provision of providing ubiquitous infrastructure, the need to provide security increases to a great degree. As wireless communication takes place mainly through the radio signals rather than wires, it is easier to intercept or eavesdrop on the communication channels. Therefore, it is important to provide security from all these threats. There are different kinds of issues within security like confidentiality, integrity, availability, legitimacy, and accountability that needs to be individually taken care off.
One of the key issues of these being, confidentiality and authentication, where the user must be protected from unauthorized eavesdropping. The goal of authentication protocol is to check the identity of other users or network centers before providing access to the confidential information on the users side. When designing any security protocol, there are certain conditions that need to be considered. Firstly, the low computational power of the mobile users and secondly, the low bandwidth available. Therefore, it is important to design the security protocols so as to minimize, the number of message exchanges and the message size. The proposed protocols discussed in this paper try to solve these problems using the limited resources available at the client side in a mobile environment.
In this paper, we concentrate our discussion on few authentication protocols that were proposed to provide security between the users and the network. These protocols are based on the use of certificates, which are built on the concept of security keys
(cryptography). Another protocol that is discussed in this paper is the “KiloByte” Secure
Socket Layer (KSSL) protocol, which is an extension of Secure Socket Layer (SSL) protocol used for wired networks.

1

The structure of the paper is as follows: In Section 2,we will discuss the different issues of security. In section 3, the authentication protocols and the KSSL protocol are discussed. In Section 4, the performance of the security protocols is provided, followed by Discussion in section 5 and Conclusion in section 6.
2.Security Issues
Many authors [7] have presented classifications of security issues in communication networks. There are five fundamental goals of security in information system.


Confidentiality, preventing unauthorized users from gaining access to critical information of any particular user.



Integrity, ensures unauthorized modification, destruction or creation of information cannot take place.



Availability, ensuring authorized users getting the access they require.



Legitimate, ensuring that only authorized users have access to services.



Accountability, ensuring that the users are held responsible for there securityrelated activities by arranging the user and his/her activities are linked if and when necessary.

The way these goals are achieved depends on the security policy adopted by the service providers. 3.Authentication Protocols
In a wireless mobile communication environment, the messages transmitted over wireless medium are more susceptible to eavesdropping than in wired network. Also, it is possible for any user to access the mobile communication system using a false identity. In order to provide security from the above-mentioned situations, we use encryption, which provides confidentiality of the messages sent over wireless channel and to authenticate. There are two types of encryption techniques in cryptosystem, namely symmetric-key cryptosystem and asymmetric-key cryptosystem. The main idea in using these techniques is to conceal the content of the messages before transmitting them in the clear (radio signals). In this system, a common key is shared between the entities before any communication session begins and later these session keys are used to encrypt the data.
3.1 Symmetric-Key and Asymmetric Cryptosystems
In a symmetric-key cryptosystem, the encryption and decryption keys are the same. Since the encryption and decryption transformations are easily derivable from each other, a common secret key is shared between the communicating entities in advance via a secure

2

channel. Therefore, the security of symmetric-key cryptosystems depends on keeping the key secret. Some of the most important symmetric-key cryptosystems that are used presently are the American Data Encryption Standard (DES) and the Japanese Fast Data
Enciphering Algorithm (FEAL).
In an asymmetric-key (public-key) cryptosystems, the encryption and decryption keys differ. Each user has a private key and a public key. Let us consider a scenario, where
Alice wants to send a message to Bob. Alice encrypts the message M using Bob’s public key Pbob, which is exchanged before the session started. At Bob’s side, this encrypted message is decrypted using Bob’s private key Sbob, which is known only to Bob.
Another function in public-key cryptosystem is the use of digital signatures. In this process, if Bob wants to send a message to Alice, he first signs the message M with his private key Sbob to obtain a digital signature S= [h (M) Sbob] of M, where h ( ) is one-way hash function. Here, hash functions like MD5 and SHA are used which accepts a variable size message and outputs a fixed sized representation h (M) of M. Alice decrypts this encrypted message by using Bob’s public key. One of the widely used public-key cryptosystem is the RSA public-key cryptosystem proposed by Rivest, Shamir, and
Adleman (RSA). The security of the RSA key is based on the difficulty of factoring large integers. Another public-key cryptosystem that is widely used is the Modular Square
Root (MSR) public-key cryptosystem. This is a variant of RSA, where the public key is the modulus N, which is a product of two large primes. MSR requires only one modular multiplication for computing the encryption keys, and because of its low computational cost, is preferred over RSA.
3.2 Protocols based on Symmetric-Key Encryption
3.2.1 Encryption using Symmetric-key function
Because of its negligible computational cost, a symmetric-key encryption is preferred. In this protocol, the home network broadcasts a random number r.
Mobile user
Mobile user

Home Network: r
Home Network: IDms, f (k, r)

Then, the mobile user sends its identity IDms along with function f (k, r), where f () is a symmetric-key function such as DES or FEAL, k is the secret key of the mobile user that it shares with the home network. When the home network receives the secret key from mobile user, it fetches the key in the database and completes the authentication. Once the session keys are exchanged, the messages are encrypted using these keys before transmission. 3

3.2.2 Encryption using Diffie-Hellman Key Exchange
Diffie-Hellman key exchange is another protocol that is used in Cellular Digital Packet
Data (CDPD). This method takes advantage of the ease with which exponentials can be computed in a Galois field GF (q), where q is a prime of elements. As mentioned in paper [1], if y= X mod q, for 1 < X < q-1, where is a fixed primitive element of
GF (q), then X= log y mod q is referred to as the discrete logarithm of y to the base over GF (q). Consider a scenario, where Alice and Bob want to communicate. Here,
Alice selects a random number Xa between 1 and q-1, which it keeps as a secret and sends Ya= Xa mod q to Bob. Similarly, Bob chooses a random number Xb and sends
Yb= Xb mod q to Alice. Once the two entities receive the messages, they compute
Ks = XaXb mod q and use it as their key. As no one except, Alice and Bob know their keys, any one trying to compute Ks has to do using Ya and Yb alone. The security of this system is based on the difficulty of taking the discrete logarithm.
3.3 Protocols based on Public-Key Certificates
In this protocol, a universally trusted certificate authority (CA) is used. This CA can be a single large service provider. Whenever the mobile user registers with a home network, it is provided with a certificate that contains the mobile user’s identity, the expiration date of the certificate, the certificate authority’s signature and lastly the certificate authority’s private key, Sca. Each home network has its own certificate. The certificates of the mobile user ( Certms ) and the home network ( Certhn ) will be as follows:
Certhn = {IDhn, phn, datehn, [h (IDhn, phn, datehn)] Sca,
Certms = {IDms, datems, [h (IDms, datems)] Sca, where h () is the one-way hash function date is the expiration date of the certificate phn is the private key of the Home Network
Sca is the secret key of the certificate
In this scenario, the home network broadcasts its certificate Certhn and the mobile user authenticates the home network by verifying the signature with the public key pca of the certificate. Mobile user
Mobile user

Home network: Certhn
Home network: [Ks] phn, f (Ks, Certms)

Later, the home network chooses a session key Ks randomly and encrypts it with the public key of the home network. Also the certificate of the mobile user is encrypted with
Ks and together both are sent to the home network. When the home network receives the messages, it decrypts the message with its secret key Shn.
Since the security is based on the certificates, any personnel who get to know the certificates has a chance to impersonate the mobile user at home network side. To avoid

4

this kind of security breach, Beller, Chang, and Yacobi suggested using an additional mutual authentication step where another session-key derived from Diffie-Hallman key exchange is used.
In Diffie-Hallman key exchange method, the certificates of the home network and the mobile user contain some additional information as shown below.
Certhn = {IDhn, phn, Yhn, datehn, [h (IDhn, phn, Yhn, datehn)] Sca,
Certms = {IDms, Yms, datems, [h (IDms, Yms, datems)] Sca,
Yms = Xms mod N and Yhn = Xhn mod N are the public values for the Diffie-Hellman key exchange of mobile user and home network respectively. Xms and Xhn are the secret key values.
In this method, the mobile user computes Ks`= (Yhn) Xms mod N and chooses a random key Ks to encrypt the certificate Certms. After receiving the encrypted message the home network computes Ks’ = (Yms) Xhn mod N. Now, both the entities use their session keys
Ks` to encrypt the message before sending them on the communication channel. As the session keys are computed using their individual secret keys, any impersonation can be identified. But there are other problems involved in this method. The session keys generated are identical for all sessions, which is not a good sign from a security point of view. To improve on this method, where it is possible to generate variable session keys, a new protocol was proposed.
In this improved method, the secrecy of the certificates is not a priority. This protocol is similar to the one above, the only difference is in the certificates where the value of Yms is equal to -Xms mod N and Yhn is equal to -Xhn mod N.
Mobile user Home network: Rhn+Xhn, Certhn
+
Mobile user computes Ks`= (Yhn * Rhn X hn) Rms mod N
Mobile user Home network: Rms+Xms, [Ks] phn, f (Ks, Certms)
Home network computes Ks` = (Yms* Rms+Xms) Rhn mod N
Mobile user Home network: f (Ks, [IDhn, IDms])
In this method, a random numbers Rhn and Rms are used. The home network calculates
Rhn+Xhn
and along with its certificate Certhn broadcasts the message to mobile users.
After receiving the message, the mobile user calculates Ks` using Yhn present in the certificate. Later, the mobile user generates a random session key Ks and encrypts it with public key phn and sends it to the home network together with f (Ks, Certms) and Rms+Xms.
Then the home network generates its session key Ks` using the public key Pms. Once both the entities establish their session keys they start exchanging the messages using these keys. The advantage of using this method is that each time a session is set-up, a different session key is generated because of the use of random number Rms and Rhn.

5

There are also situations where communication between two mobile users needs to be considered. To handle this situation an end-to-end security protocol was proposed.
In this scenario, communication between the mobile users should be protected from both outsiders and insiders of the mobile networks, which also includes the home network. In order to support this kind of security, two levels of mutual authentication and session key exchange are used, one between the mobile user and the network and the other between the mobile users.

Consider two mobile users MS (A) and MS (B) that are registered to home networks
HN (A) and HN (B) respectively. Also these mobile users are considered to be outside the home networks, in visiting network VN (A) and VN (B) respectively. Initially, both, the mobile users and the visiting network authenticate each other thereby sharing a common session key using the Diffie-Hellman key exchange mechanism. If the visiting network finds the mobile users certificate to be invalid, it checks with the home network to get the valid certificate for that particular mobile user. The main role of the visiting network here is to deliver the messages securely to the other visiting network involved in the communication process. After a call set-up is made, the network is no longer involved in any cryptographic computations. It just passes the encrypted messages to the required destination. 3.4 KSSL Security Protocol
New technologies like Wireless Application Protocol (WAP) and PalmOS, which are used on small mobile devices like mobile phones and Palmtops, do provide some kind of security in a wireless environment. But, the authors of this paper [2] listed out some problems in this WAP protocol, the primary being the use of proxy-based architecture to provide security.

Mobile
User

WTLS

SSL/TLS
Internet

WAP Proxy

WAP Server running
SSL/TLS

Figure 1: Proxy- based architecture

6

All the data that the mobile user sends to a particular destination goes through this proxybased server provided by the service provider. As shown in figure1, the WAP server decrypts the encrypted data using Wireless Transport Layer Security protocol (WLTS) and re-encrypts it using SSL before forwarding to the destination. Some concerns that were raised are, on issues like scalability, where a performance bottleneck comes-up with large number of users using a single service provider besides being a single point of failure, the need to maintain large data buffers to compensate the flow between a low bandwidth wireless channel and a high bandwidth wired channel, and security, where-in the proxy gets to see the process of encryption and decryption, which raises questions on security of sensitive data.
In contrast to the proxy-based architecture, the authors proposed a new protocol named
“Kilobyte” Secure Socket Layer (KSSL), which is currently under research at the Sun
Microsystems Lab. This protocol is an extension of Secure Socket Layer (SSL)
Protocol, which is widely used in a wired network to provide security. Before discussing about the KSSL protocol, we will discuss about the SSL protocol.
3.4.1 Secure Socket Layer (SSL)
As mentioned in paper [2], SSL provides encryption, source authentication, and integrity protection of application data over insecure public networks. This protocol uses the service of TCP, which provides a bi-directional byte stream service.

SSL Application

CCS

Alert

Handshake

Record Layer

Reliable bi-directional byte stream service (TCP)

Figure 2: SSL Architecture

7

As shown in figure 2, SSL is a layered protocol. The Record layer, placed above the TCP layer, provides encryption and authentication services using symmetric-key algorithm.
These keys are established by handshake protocol, which uses public-key algorithms to generate master secret between the SSL client and server. As mentioned in paper [2],this master secret is further used to derive cipher keys, initialization vectors, and message authentication code (MAC) keys for use by Record Layer. The other two protocols that are in the same layer as Handshake are Change Cipher Spec (CCS) and Alert protocols.
CCS is used to signal successful completion of the handshake, and start of bulk encryption and authentication and Alert is used to notify if any failures occur.
Because of its flexibility, SSL can support a variety of algorithms, for key agreement
(RSA, Diffie-Hallman (DH), etc.), encryption (RC4, 3DES etc.), and hashing (Message
Digest (MD5), Secure Hashing Algorithms (SHA), etc.). A standard is been specified that explicitly lists the combinations of these algorithms, together they are called ciphersuites. In our discussion, we use RSA key exchange form. Though SSL protocol supports, client and server side authentication, only server-side authentication is done, as maintaining certificates on the client-side requires maintenance. And the authentication process on the client side is done using passwords sent over an SSL-protected channel.
Full Handshake
The process begins with the client sending a ClientHello message containing a random number, a session ID and a set of supported cipher-suites to the server. The server accepts the message and checks whether it can support the proposed cipher-suite. If no, it aborts the handshake and sends a failure message back to the client. Otherwise, it generates a random number, and along with a session ID and the selected cipher-suite sends them in a
ServerHello message to the client.
Figure3: Full SSL Handshake
Client
ClientHello

ClientHello
ClientKeyExchange
CertificateVerify*
[ChangeCipherSpec]
Finished

Application data

Server
(Includes proposed cipher suites)
ServerHello
Certificate*
(Server’s RSA Certificate)
ServerKeyExchange*
CertificateRequest* (Rarely used)
ServerHelloDone
(Only if requested)
(RSA encryption of 48-byte random)
(Only with Certificate)

[ChangeCipherSpec]
Finished
Application data
8

The ServerHello message is followed by a Certificate message containing the server’s
RSA public key in an X.509 certificate. At the client side, if this certificate is not able to generate a ClientKeyExchange message then the server sends another RSA public key in a ServerKeyExchange message. The client then verifies the server’s public key and generates a 48-byte random number, called pre-master secret and encrypts it with the server’s public key. This result is then sent in ClientKeyExchange message. The client then computes a master secret using the pre-master secret, and the client and server random numbers exchanged previously. This master secret is later used for encrypting and authenticating the messages containing data. Once both, client and server establish their master secret keys a ChangeCipherSpec message is sent to signal the end of in-theclear communication. After this, a Finished message is sent, which is the first message to be completely secured using negotiated cipher-suite. Once the server receives the
ClientKeyExchange message, it decrypts the message using the client’s public key and generates a master key and stores it in the Record Layer in the same manner as at the client side. Later the server too sends a ChangeCipherSpec message followed by a
Finished message to complete the Handshake process. From here on, all the data that is exchanged is securely encrypted as negotiated during the handshake process. Each direction of the traffic’s flow uses distinct encryption and MAC keys.
Abbreviated SSL Handshake
Another feature that SSL Handshake supports is the session reuse, where the client and server are allowed to reuse the master key derived in a previous session.
Client
ClientHello

Server
(Includes session ID to be reused)
ServerHello
(Echoes client-chosen session ID)
[ChangeCipherSpec] (Both parties reuse master key from
Finished
previously established session)

[ChangeCipherSpec]
Finished
Application data

Application data

Figure5: Abbreviated SSL Handshake
In the abbreviated handshake protocol, the communication starts with client sending a
ClientHello message containing a random number, a non-zero ID of a previously negotiated session, and the proposed cipher-suite. After receiving, the server checks whether it has the session information with it and is ready to use the corresponding master key. If yes, it echoes back the session ID in the ServerHello message. Otherwise, it sends a new session ID signaling the client that a Full handshake process needs to be initiated. As the abbreviated handshake protocol doesn’t involve certificates or public key

9

cryptographic operations, fewer messages are exchanged and as a result the process is faster compared to a full handshake process.

3.4.2 KSSL and KSecurity
“KiloByte” SSL (KSSL) is a protocol implemented on the SSL client side for the Mobile
Information Device Profile (MIDP) of Java2 Micro Edition. The overall architecture and relationship to the base J2ME is shown in Figure6. This model works in similar terms as a SSL protocol, the only extension being that, all the critical information such as certificates, secret key are stored in a smart card. The different classes present in the model use this information to provide security by encrypting and decrypting the content present in the messages.

Sun.Net
Package

J2ME Connector API

Java 2 Micro
Edition
(J2ME)

API

KSecurity APIs

KSSL Classes

Smart Card
KSecurity Classes
Native

Figure6: KSSL Architecture
The KSecurity classes provide all the basic cryptographic functions such as random number generation, encryption, and hashing. It also contains a Java Card API, which on some occasions is used as a hardware crypto accelerator with minimum changes to the
KSSL code. In this model the SSL protocol (KSSL) is written purely in Java and its functions can be accessed using J2ME Connector API. The Connector API in addition to
KSSL is used to support HTTPs and URLs. Another API is also used, which is yet to be

10

standardized, for offering greater control over the SSL protocol like seeking user input upon encountering problematic certificates.
Some of the features that KSSL and KSecurity offer are discussed below.
They support symmetric keys of different lengths and RSA public/private keys with modulus lengths up to and including 1024 bits. For ciphers, they use RSA for key exchange and RC4 for bulk encryption. For Signatures, they support RSA with both MD5 and SHA. Only X.509 certificates containing RSA keys and signed using RSA with MD5 or SHA are supported. The client offers only two cipher-suites, RSA_RC4_128_MD5 and RSA_RC4_40_MD5, as they are fast and universally accepted by the SSL servers.
Also client SSL supports session reuse and works on J2ME running on PalmOS, Solaris, and Windows.
4. Performance
The certificate-based security protocol is considered to be more secure than symmetric key protocol in terms of key management. Because of its computational complexity, public key cryptosystem is considered to be a burden on a mobile user with limited resources. Instead, a MSR with RSA system and low component can be used for mobile users. Once a smart card containing the secret value, the certificate and the public key of the CA is issued to a mobile user, no secret information ever leaves the smart card. As specified in the paper [1], the recently announced smart card chip contains an 8-bit CPU as a standard smart card controller and an additional arithmetic coprocessor optimized for modular exponentiation of long operands.
The performance of the KSSL protocol was tested using PalmOS. The results are as follows: the bulk encryption and authentication algorithms are adequately fast on Palm’s
CPU. On a 20MHz chip (found in Palm Vx, Palm IIIc, etc.) RC4, MD5, and SHA all run at over 100Kbits/s. When measuring SSL Handshake Latency, a typical key with size of
768 or 1024 bits using RSA takes 0.5-1.5 seconds on a 20MHz Palm CPU.
The table shown below gives the performance of KSSL cryptographic primitives on
PDAs. This information is taken from paper [2].

11

5. Discussion
Presently many wireless technologies are being used with each having their own approach to provide security. In this section we will discuss some of the current approaches and industry standards that are being followed.
The IEEE 802.11 wireless LAN uses a wired equivalent privacy protocol (WEP) mechanism to provide security. Here, the wireless network administrator provides a
WEP-algorithm-based key for each authorized user. Any user without an assigned key is denied access.
The WAP application provides security, using a Wireless Transport Layer Security protocol (WTLS). This protocol uses RSA-based cryptography. However another protocol is also under consideration called Elliptic-Curve Cryptography (ECC). This protocol provides high level of security and using less memory resources and computation. Another widely used authentication protocol is the wireless public-key-infrastructure mechanism (PKI), which is based on the wired PKI mechanism. Some of the products that use this mechanism are Certicom, eTrust, VeriSign.
Some of the new wireless-security standards that are under development are:
Pre-IKE Credential (PIC), where IKE stands for Internet Key Exchange: It is a protocol proposed by the IETF’s IP Security Remote Access Working Group. This protocol

12

provides additional features like flexibility and ease of configuration to the IPSec (IP
Security) standard.
Open Multimedia Applications Protocol (OMAP): This protocol was developed by Texas
Instruments. “It is a library of software from various vendors that will permit secure transactions on wireless devices that use TI’s digital signal processors”[3].
Biometrics: It is a new system that identity’s authorized user using their unique physical characteristics like finger prints, voice patterns, facial geometry, or retinal images.

6. Conclusion
Initially, when the wireless mobile environment came into existence security was not given a priority. But, as the time passed by, the extent to which this technology is used increased. This created a need to protect the information from unauthorized users and control the fraud. In the beginning, many security protocols where proposed, which where based on cryptographic techniques. With new loopholes coming up each time, a new protocol was proposed based on the existing one, to answer the problem. Presently, many researchers are concentrating on using the wired based security protocols over the wireless mobile communication. One such research is taking place at Sun Microsystems
Labs, where the KSSL protocol is being tested within the corporate campus, using concepts like smart card and certificates.
According to me, the present research that is going on, that is trying to extend the security protocols used in wired networks to wireless mobile environment is a good step in providing high-end security. As the security protocols used in wired network have undergone heavy scrutiny over the years from various ends using these protocols in the mobile environment, would help in achieving good performance results.
Also, many wireless communication service vendors are developing new protocols and standards to provide a secured medium for the mobile users. With these efforts relatively new and not yet developed to its full extent, service providers are hoping to keep security development in pace with other developmental aspects of wireless technology.

References:
[1] Chang-Seop Park, “ On Certificate-Based Security Protocols for Wireless Mobile
Communication Systems.”IEEE Network 1997
[2] Vipul Gupta and Sumit Gupta “Securing the Wireless Internet” IEEE
Communications 2001.
[3] S.K Miller, “Facing the Challenges of Wireless Security”, IEEE Computer, 2001.
[4] Gopal Racherla, Debashis Saha, “ Security and Privacy issues in Wireless and Mobile
Computing “ IEEE Proceedings, 2001.
[5] Jun-Zhao Sun, Douglas Howie, Antti Koivisto, Jaakko Sauvola, “ A Hierarchical
Framework Model of Mobile Security”, IEEE 2001.

13

[6] Subramanyam, Anupam Joshi, “ Security in Mobile Systems”, IEEE Proceedings
1998.
[7] Asokan, "Security Issues in Mobile Computing," Univ. of Waterloo, Dept. of
Computer Science, Technical Report CS690B, Apr. 1995.
[8] Charlie Perkins, “ Mobile IP and Security Issue: An Overview”
[9] Mavridis Pangalos, ”Security Issues in a Mobile Computing Paradigm.”

14

Similar Documents

Premium Essay

Mobile Computing

...physical changes to occur most definitely. “Projected screens and keyboards that can be used on walls and other surfaces are also a given. As are hologram projection screens and keyboards, both 3D and flat (Baker, 2011).” As bulky and spacious as PC desktops are, there are also positives about them as well. One reason you won’t see PC desktops vanish is because of their ability to process and store much more than any mobile device. A mobile device just can’t handle as much as a regular computer can. A lot of that has to do with the fact that researchers are having a difficult time trying to give mobile devices the same “power” as a desktop computer but in a much much smaller space. The main reason manufactures want to claim the desktop as being dead is because they want their product (mobile devices or wireless notebook/tablets) to sell quickly and then they can be off to the next adventure with the new products in town. There will come a time when the desktop will finally see its end in the technology world but until researchers can figure out a way to get mobile devices to act and manage as a desktop computer, then desktop computers are far from being extinct yet. For example, I can’t print from my cell phone (at least not to my knowledge!) therefore I have...

Words: 1375 - Pages: 6

Free Essay

Mobile Computing

...Mobile Computing Mobile computing is the use of a mobile device such as a smartphone, laptop, tablet etc. to access, store, create, process or communicate information without the need of being confined to one specific location. Over the years mobile computing has increased tremendously. Everyone has a preference in what devices they want to use and how beneficial the device will be to them while they are mobile computing. Due to the high demand and usage of mobile computing no matter where a person may go they are for sure to see someone utilizing a mobile computing device. Although mobile computing is now very popular and can be taken advantage of with many different devices this was not always the case. The first mobile computing device was a laptop named the Osborne 1. The Osborne Computer Corporation announced the Osborne 1 at the West Coast Computer Faire a San Francisco’s Brooks Hall (McCracken, 2011). Osborne 1 was the first portable pc and also shipped with software much like we have today. The Osborne 1 although it was portable was nothing like the laptops of today. The sewing machine-sized Osborne 1 weighed 24 pounds (slightly more than ten modern-day 11” MacBook Airs) and sported a handle; it created a class of PC that would forever be known as “luggables (McCracken, 2011, para. 22).” Osborne 1 was short lived when the company filed for bankrupty in 1983. Over the years, the design of mobile computing devices has changed tremendously. The fact that computers are...

Words: 723 - Pages: 3

Free Essay

Mobile Computing

...A View of the Ways Mobile Computing Has and Will Affect the Nature of Humans in Our Future Theresa McCray INF 103 Computer literacy Denton Murray Jan 28 2013 Mobile Computing is evolving faster than lighting it would be wise to be knowledgeable about the subject. In this paper I will explain what mobile computing is and will give examples of present day devices and their used as well as give some examples of what the future may bring in the way we compute in the future. Mobile computing past, present and the future Over the past years we have evolved into a new era of mobile computing, one that guarantees a wide variety in application, improved usability, and faster networking. Apple’s iPhone 5 is a prime example for the trends were heading into, but there are plenty of other options on the rise. Google Android made its appearance in 2008, offering a great alternative to apple devices. Apple had control of almost all computing systems since it was the only platform that could be used in mobile computing. Google brought competition to Apple allowing people to have a choice and the competition caused by...

Words: 1182 - Pages: 5

Premium Essay

Mobile Computing

...Mobile Computing and Social Networks CIS 500 June 4, 2012 Mobile computing and social networks are not only good for keeping in touch with friends and family or playing games, but business have also gotten on the band wagon and developed apps to conduct work. One of the apps that are being used often is geo-location. This type of application is a technology that uses data obtained from an individual’s mobile device to identify or describe their actual physical location at a given point in time. This app benefits not only the business that uses them but also the general public who has it downloaded on their phone. It’s efficient for us as customers because we can receive information that is instantly relevant to a purchase decision, to location-specific discounts and services (Jaiswal & Nayak, 2010, p. 1). Business use this for marketing strategies in order to get new customers and returning customers to keep coming back and making purchases. Other ways that business uses geo-data are Know Your Customer (KYC), delivery and assessment management, cloud balancing, content customization, vehicle Ad Hoc Networks, and Real-time incident management just to name a few. It has become easier and easier to capture this information due to the ability of mobile phones, GPS devices, even swiping are debt or credit cards. Every time we use one of these devices information goes into a data warehouse for businesses to use. There are two ways that geo-location data is...

Words: 2173 - Pages: 9

Premium Essay

The Impact of Mobile Computing

...The Impact of Mobile Computing Diana Phillips INF 103: Computer Literacy Instructor: Melody White September 15, 2014 Mobile computing has infiltrated every area of our planet and personal lives. We have become so dependent upon our mobile devices they are often referred to as our third limb. Regardless of race, color, creed or location, mobile technology has shrunk the entire world into the palm of our hands. Mobile technology has made research, communication with our friends and family, education, entertainment and even banking possible to do on the go. There are mobile applications for just about everything. There are “apps” for games, social networking, banking, shopping, web browsers, word processors, weather, GPS, weight management, and even an “app” to remind you to drink water. A few of the hottest trends in mobile applications are social networking, location-based services, mobile search and mobile commerce. Microsoft has nearly the entire Office Suite available in a mobile application. The applications you once used only on a desktop are now designed for smartphones and tablets. Word, PowerPoint and Excel are a few of the Microsoft applications available on a mobile device. These mobile applications are the full versions. Some of the features had to be removed in order for the application to work in a mobile setting Mobile computing has become so popular there are now mobile awards given much like the Academy Awards for films. The GSMA...

Words: 941 - Pages: 4

Free Essay

Challenges of Mobile Computing

...Challenges of mobile computing: An Overview Mobile computing encompasses a number of technologies and devices, such as wireless LANs, notebook computers, cell and smart phones, tablet PCs and PDAs. Basically, any electronic device that helps you organizes your life, communicate with coworkers or friends, or do your job more efficiently is part of mobile computing, the combination of wireless communication infrastructure and portable computing devices has put the background for new computing ,which allows users access information and working With each others, when they move. Mobility can find e the form of users moving between specific terminals in the world. The constraints of mobile computing: mobile device constraints: are small size according to its processor speed ,the capacity of storage space and monitor resolution. Network constraint: the network of mobile wireless is not full reliable when to compare wired. Mobility constraints: mobile parts are very important for each one , the storage is the one of which makes mobile to save a lot of information. Wireless communication is very hard to Automate as wired communication because of the interaction of surrounding environment with the message. Mobility is the capacity to alternate one position when connected to the network increases the stability of some information. Portability there is a lot of problems for moving mobile from one location to another such as low power can’t find enough electricity to charge your mobile, second...

Words: 281 - Pages: 2

Premium Essay

Mobile Computing

...cloud computing Cloud Computing Cloud computing is technology that is rented or leased on a regular or as needed basis. Cloud computing delivers IT capabilities as services over the Internet, allowing them to be managed and accessed via the Internet (Turban & Volonino, 2011, p. 32). Cloud computing was used mostly in the business world until recently when introduced to Consumers by Apple. It offers a pay as you go pricing option, which is convenient to many consumers. Other organizations now also offer consumers the same capability that was once exclusive to businesses only. Ericsson is one of the world’s top leaders in providing technology and services to telecom operators. Cloud computing has made a difference in how Ericsson is able provide and compete with others in the industry. Ericsson is the leader in 2G, 3G and 4G mobile technologies, and provides support for networks with over 2 billion subscribers and has the leading position in managed services (aws.amazon.com, p.1). The company’s portfolio comprises mobile and fixed network infrastructure, telecom services, software, broadband and multimedia solutions for operators, enterprises and the media industry (p.1). AWS is language and operating system agnostic platform (p.1). You choose the development platform or programming model that makes the most sense for your business. AWS offers 29 instance types with different amounts of compute, memory, I/O performance, graphics hardware so you can...

Words: 927 - Pages: 4

Premium Essay

Mobile Computing

...ABSTRACT In the context of the rapid growth of mobile computing penetration in developing countries, mobile telephony is currently considered to be particularly important for such development. Yet, until recently, very little systematic evidence was available that shed light on the developmental impacts of mobile computing. The objective of this paper is to evaluate the problems and prospects of mobile computing in Nigeria. The paper will be analyzed by theme in order to provide a thematic overview as well as a comparative analysis of the development role of mobile computing. In exploring the evidence from completed projects as well as the foci of new projects, the paper summarizes and critically assesses the key findings and suggests possible avenues for future research. CHAPTER ONE INTRODUCTION The fusion of computer and telecommunication technologies has heralded the age of information superhighway over wire-line and wireless networks. Mobile cellular communication systems and wireless networking technologies are growing at an ever-faster rate, and this is likely to continue in the foreseeable future. Wireless technology is presently being used to link portable computer equipment to corporate distributed computing and other sources of necessary information. Wide-area cellular systems and wireless LANs promise to make integrated networks a reality and provide fully distributed and ubiquitous mobile communications, thus bringing an end to the tyranny of geography. Higher...

Words: 8346 - Pages: 34

Free Essay

Mobile Computing

...Mobile Technology and Social Networking in the Health Sector Introduction Rapid technological advances have brought about a new twist of operation in the health segment. Mobile computing devices and other portable devices such as iPods and iPads have redefined the relationship between computers and human beings. These technological advances signify substantial evidence of departure from computational paradigms, which necessitated users to explicitly interact with computing systems to achieve the expected results. The health sector is also demonstrating its pursuit to be in tandem with the changing technology. By using advanced methods, which are not substitutes, but techniques to improve monitoring of patients health, the sector has demonstrated the efficiency of the use of technology to monitor patients’ status even while at home. This global integration of operations from different applications enables data sharing, via image, and voice outputs. According to Magal and Word (2011), patient monitoring is indispensable to any health facility. Several departments are equipped with electrical and computing devices that facilitate the monitoring of patient status. Not only are these facilities meant for use in the health centers, but also, technology has opened up other platforms through which patients can share their experiences with other patients of similar conditions, and monitor their health progress without the need of visiting health centers physically. Comparison of Inpatient...

Words: 1570 - Pages: 7

Premium Essay

Mobile Computing

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 3950 - Pages: 16

Premium Essay

Mobile Computing & Social Networks

...Paper: Mobile Computing & Social Networks Week 10: Mobile Computing & Social Networks Professor Gregory Hart Information System Decision-Making CIS500 September 9, 2012 Abstract In my paper I will talk about Mobile Computing and Social Networks and how they all work. I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i. e., iPhone, iPad, Windows Phone, or Android. I will also talk about Mobile applications require high availability because end users need to have continuous access to IT and IS systems. I will discuss ways of providing high availability. Finally I will discuss mobile devices are subjected to hacking at a higher rate that non-mobile devices and discuss methods of making mobile devices more secure. Table of Contents Abstract ………………………………………………………………………………....... 2 Contents ………………………………………………………………………………….. 3 Effectiveness & Efficiency mobile-based applications to capture Geolocation data ……. 4 Benefits realized by consumers to access their own data via mobile apps...

Words: 2905 - Pages: 12

Premium Essay

Mobile Computing and Social Networking

...Mobile Computing and Social Networks Stacy Adams Strayer University Clifton Howell CIS 500 December 15, 2012 Mobile Computing and Social Networks Assess the effectiveness and efficiency mobile-based applications provide to capture geo-location data and customer data, and quickly upload to a processing server without users having to use a desktop system. The increasing advancement in the efficiency and availability of mobile internet and smartphone capabilities has significantly enhanced the usage, capabilities and functionality of mobile based applications. It is very convenient and easy for today's mobile users to access information, conduct transactions and do several tasks via mobile applications. The ability to access data or do certain tasks via such apps from anywhere, anytime with the mobile phones without having to wait for access to regular computer has resulted in significant convenience and efficiency for people on the move. The smartphone technology is improving day by day and mobile networks are becoming stronger and secure than before, thereby enhancing the effectiveness and efficiency of mobile-based applications. The mobile phone applications are very useful in capturing geo-location data and customer data remotely and transfer such data to the processing server without having the need to use a desktop system, which significantly enhances the convenience and reduces the time required to transfer the data. Such capabilities of mobile applications...

Words: 1635 - Pages: 7

Premium Essay

Mobile Computing and Social Networks

...Mobile Computing and Social Networks Week 10 Term Paper CIS500 2014 Professor: 9/8/2014 Mobile Computing and Social Networking Mobile base applications are capable of providing your most sensitive information with and sometimes without your knowledge. The geolocation data can reveal a person’s physical location, and this can be done by a Global Positioning System (GPS), Internet Protocol (IP) geolocation using data bases that map IP addresses to geographic locations as well as financial transaction information. This technology has become very useful, especially in the social networking arena. It allows us to inform our friends and followers as to where we are and what we are doing. This technology created a way for us to do things once thought could only be done via telephone or desktop computer. This same technology has become a part of us and everything we do, we have grown to depend on it and it has proven to be most efficient and effective. Perhaps one of the greatest accomplishments of mobile based applications is mobile GPS, instead of doing things the traditional way by pulling directions up on our desktop and printing it out, we can now just plug the information into our mobile GPS and listen to the sound of a voice giving us step by step directions as we are driving via our mobile device from “Point A” to “Point B”. This is done via a chip installed within your mobile device, with this technology your device has a connection via the...

Words: 2686 - Pages: 11

Premium Essay

Mobile Cloud Computing

...CHAPTER 1 : INTRODUCTION Mobile devices allow users to run powerful applications that take advantage of the growing availability of built-in sensing and better data exchange capabilities of mobile devices. As a result, mobile applications seamlessly integrate with real-time data streams and Web 2.0 applications, such as mashups, open collaboration, social networking and mobile commerce. The mobile execution platform is being used for more and more tasks, e.g., for playing games; capturing, editing, annotating and uploading video; handling finances; managing personal health, micro payments, ticket purchase, interacting with ubiquitous computing infrastructures. Even mobile device hardware and mobile networks continue to evolve and to improve, mobile devices will always be resource-poor, less secure, with unstable connectivity, and with less energy since they are powered by battery. Mobile devices can be seen as entry points and interface of cloud online services. Mobile devices (e.g., smartphone, tablet pcs, etc.) are increasingly becoming an essential part of human life as the most effective and convenient communication tools not bounded by time and place. Mobile users accumulate rich experience of various services from mobile applications (e.g., iPhone apps, Google apps, etc.), which run on the devices and/or on remote servers via wireless networks. The rapid progress of mobile computing (MC) becomes a powerful trend in the development of IT technology as well as commerce...

Words: 5635 - Pages: 23

Premium Essay

Mobile Computing Issues

...Introduction Issues in Mobile Computing • There are several characteristics of wireless networks and mobile devices that give rise to issues that do not pose a problem in fixed, wired infrastructure. – Adaptive behaviour p – Battery power – Limitation on local resources – Small display size – Disparity in the availability of remote services – Unpredictable variation in QoS. 1 WRES3405 (3) 2 WRES3405 (3) Adaptive Behaviour • Adaptability is critical to support pervasive computing. • Pervasive computing extends the problem domain: – – – – Effective use of smart space space. Invisibility. Localised scalability. Masking uneven conditioning. • Adaptive behaviour arises due to a significant mismatch between supply and demand for resources. – Often in low level systems, e.g. bandwidth, memory. • As a mobile user moves, services and resources may become available or disappear. • Mismatch may occur even when the user is static static. • The system has to handle the variation in a way that minimises inconvenience to users and does not abruptly interfere with the task the user is trying to accomplish. WRES3405 (3) 3 WRES3405 (3) 4 • Other reasons for a mismatch: – The availability of compute servers or data-staging server is location-dependent and affects techniques such as cyber foraging. – In case of mobile code, low-level resources and interactive resources may vary widely between the source and destination systems. As time elapses, the resource level may...

Words: 2198 - Pages: 9