A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer

Authors

  • M. Inbavalli
  • V. Suriya p rtmnt of M str of omputr ppli tions, r.Prum l M nimk l i ollg of nginring, Hosur

Keywords:

securityattacks, secure data, encryption and decryption, firewall, applications, wirelessmobile

Abstract

Mobile phone becomes the foremost typical and fashionable mobile device in recent years. It combines the practicality of transportable and Personal Digital Assistant. Besides, it provides several computers’ practicality, like process, communication, knowledge storage and etc. But, some users may be permission to allow for device and application choices. Device to attack by victimization network. The common attacks for network to security attacks, privacy attack, region attack, Phishing Network Spoofing, Desktops, etc. How to secure the mobile data to secure and protected are Device Protection, Information Protection, Application Management Security, and manage the application permission. Transferring the data use the Encryption and Decryption methods. To avoid the problems should be used for responsible websites. This is worked for only server sides and secure or install firewall in your device. Mobile firewall is used to reduce the security risk and protect the integrity of the network device.

Author Biography

M. Inbavalli

Tel- 9442825147

References

[1] Manish Singh, Girish Tere “Study of Security Threats and Vulnerabilities Associated With Mobile Device”, IJCE, Vol.1, Issue.1, Page 15, August 2016.

[2] Rajivkumar Mente and Asha Begadi “Android Application Security”, ACST, Vol.10, No.5, pp.1207-1210, ISSN 0973-6107, 2017.

[3] Varadan,”Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, IEEE, 15 JULY 2017.

[4] B.V.Varshini,M.VigilsonPrem,J.Geethapriya “A Review on secure data sharing in cloud computing environment”, IJARCET, Vol. 6, Issue. 3, March 2017, ISSN: 2278-1323.

[5] S.Monali Gaigole, Prof.M.A.Kalyankar “The Study of Network Security with Its Penetrating Attacks and Possible Security Mech- anisms”, IJCSMC, Vol.4, Issue.5, pg. 728-735, May – 2015, ISSN 2320–088X.

[6] Mohan V.Pawar, Anuradha J “Network security and Types of Attacks in Network”, Elsevier B.V, ICCC 2015.

[7] Sardasht M.Mahmood,Bakhtiar M.Amen,Rebwar M.Nabi “Mobile Application Security Platforms Survey”, IJCA, Vol.133, No.2, January 2016.

[8] Md.Rakibul Hoque “Mobile Computing Security:Issues and Requirements”, JAIT,Vol.7, No.1, february 2016.

[9] I.Indu,P.M.Rubesh Anand,Shaicy P.Shaji “Secure File Sharing Mechanism and key management for Mobile Cloud Computing Environment”, IJST, Vol.9(48), December2016.

[10] Syed Farhan Alam Zaidi, Munam Ali Shah, Muhammad Kamran, “A Survey on Security for Smartphone Device”, IJACSA, Vol.7, No.4, 2016.

[11] Vidhi B patel, Chandresh Parekh, Reena M Patel “Encryption and Decryption Implementation method using network socket programming”, IJARCS, Vol.8, No.5, 2017, ISSN No.0976-5697.

Downloads

Published

2019-05-30

How to Cite

[1]
I. M and S. V, “A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer”, Int. J. Comp. Sci. Eng., vol. 7, no. 17, pp. 65–70, May 2019.