Open Access   Article Go Back

A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer

M. Inbavalli1 , V. Suriya2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 65-70, May-2019

Online published on May 22, 2019

Copyright © M. Inbavalli, V. Suriya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Inbavalli, V. Suriya, “A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.65-70, 2019.

MLA Style Citation: M. Inbavalli, V. Suriya "A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer." International Journal of Computer Sciences and Engineering 07.17 (2019): 65-70.

APA Style Citation: M. Inbavalli, V. Suriya, (2019). A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer. International Journal of Computer Sciences and Engineering, 07(17), 65-70.

BibTex Style Citation:
@article{Inbavalli_2019,
author = {M. Inbavalli, V. Suriya},
title = {A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {65-70},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1314},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1314
TI - A Study on Wireless Mobile Phone Security Attacks and Secure Data Transfer
T2 - International Journal of Computer Sciences and Engineering
AU - M. Inbavalli, V. Suriya
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 65-70
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

Mobile phone becomes the foremost typical and fashionable mobile device in recent years. It combines the practicality of transportable and Personal Digital Assistant. Besides, it provides several computers’ practicality, like process, communication, knowledge storage and etc. But, some users may be permission to allow for device and application choices. Device to attack by victimization network. The common attacks for network to security attacks, privacy attack, region attack, Phishing Network Spoofing, Desktops, etc. How to secure the mobile data to secure and protected are Device Protection, Information Protection, Application Management Security, and manage the application permission. Transferring the data use the Encryption and Decryption methods. To avoid the problems should be used for responsible websites. This is worked for only server sides and secure or install firewall in your device. Mobile firewall is used to reduce the security risk and protect the integrity of the network device.

Key-Words / Index Term

wirelessmobile, securityattacks, secure data, encryption and decryption, firewall, applications

References

[1] Manish Singh, Girish Tere “Study of Security Threats and Vulnerabilities Associated With Mobile Device”, IJCE, Vol.1, Issue.1, Page 15, August 2016.
[2] Rajivkumar Mente and Asha Begadi “Android Application Security”, ACST, Vol.10, No.5, pp.1207-1210, ISSN 0973-6107, 2017.
[3] Varadan,”Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, IEEE, 15 JULY 2017.
[4] B.V.Varshini,M.VigilsonPrem,J.Geethapriya “A Review on secure data sharing in cloud computing environment”, IJARCET, Vol. 6, Issue. 3, March 2017, ISSN: 2278-1323.
[5] S.Monali Gaigole, Prof.M.A.Kalyankar “The Study of Network Security with Its Penetrating Attacks and Possible Security Mech- anisms”, IJCSMC, Vol.4, Issue.5, pg. 728-735, May – 2015, ISSN 2320–088X.
[6] Mohan V.Pawar, Anuradha J “Network security and Types of Attacks in Network”, Elsevier B.V, ICCC 2015.
[7] Sardasht M.Mahmood,Bakhtiar M.Amen,Rebwar M.Nabi “Mobile Application Security Platforms Survey”, IJCA, Vol.133, No.2, January 2016.
[8] Md.Rakibul Hoque “Mobile Computing Security:Issues and Requirements”, JAIT,Vol.7, No.1, february 2016.
[9] I.Indu,P.M.Rubesh Anand,Shaicy P.Shaji “Secure File Sharing Mechanism and key management for Mobile Cloud Computing Environment”, IJST, Vol.9(48), December2016.
[10] Syed Farhan Alam Zaidi, Munam Ali Shah, Muhammad Kamran, “A Survey on Security for Smartphone Device”, IJACSA, Vol.7, No.4, 2016.
[11] Vidhi B patel, Chandresh Parekh, Reena M Patel “Encryption and Decryption Implementation method using network socket programming”, IJARCS, Vol.8, No.5, 2017, ISSN No.0976-5697.