A Survey On Security Threats in Mobile Operating Systems and Existing Solutions
A Survey On Security Threats in Mobile Operating Systems and Existing Solutions
ISSN No:-2456-2165
Abstract:- Using electronic devices has shown a [2] Mobile security-related threats such as mobile mali-
significant increase in popularity in recent years all over cious codes are also increasing rapidly. Therefore,
the world. Mobile devices have taken the highest place researchers and other mobile device companies have paid
among other electronic devices. Mobile security threats attention to protecting applications that were developed for
also have become a vast problem with coming new mobile devices from the threats of vulnerabilities of mobile
vulnerabilities of mobile devices. Here I conduct a applications. I will work on this research to reveal the
literature review to recognize the existing threats based existing threats and what are the appropriate solutions and
on different kinds of mobile operating systems and practices to overcome the different kinds of mobile threats.
discuss the existing solutions for those threats. Another When comparing the mobile operating systems, the
objective is to find current authentication methods used popularity of using Android-based mobile devices is higher
by mobile device users to protect mobile devices. in the world including developing countries. [2] Therefore, I
conducted a literature review to find the existing mobile
Keywords:- Mobile, Operating System, Security, Threats. threats which were faced especially Android mobile users
day by day and make a vulnerability analysis of Android-
I. INTRODUCTION based mobile applications and reveal the factors that can
occur in the vulnerability in mobile devices.
The attractive features of the mobile devices are able to
catch the child, teenagers and also elders in same manner.
These features are varies from day by day according to
newest technologies in the world. The mobile devices are
based on different kinds of operating systems: Android,ISO,
etc. and enabled to user to select the mobile devices with
preferred operating system. User have the ability to select
install varies kinds of applications. [15] The different kinds
of social and demo graphical factors such as age [6] and
gender and other technical factors like operating system
features caused the usage of the different kinds of mobile
devices. According to the Ericson mobility report, figure 1
shows the growth of the number of mobile subscribers and
mobile subscriptions year-wise. That also proves that usage
of mobile devices is increasing in billions the year to year.
[7]
Fig 1 Subscriptions and Subscribers (Billion)
II. BACKGROUND OF STUDIES
III. LITERATURE REVIEW
Mobile Devices are considered as their personal device
and use to perform day today operations. Therefore, they According to Kim, the security threats of smart devices
used to store private and sensitive data in mobile devices are increasing because of increasing the usage of smart
without thinking deeper about their security. It is easier to devices in the world. According to his analyzed results,
install different kinds of mobile applications in various vulnerabilities of applications in mobile devices are mostly
kinds of operating systems such as iOS, Android, etc. caused for security threats. He used 9 mobile applications
Nowadays there is a big competition among mobile which were used by public Institutions and companies for
application providers and there are the newest more and security checks experi- ments. He has revealed that mobile
more customized applications in today’s market. Most applications which were used by a public institution have
smartphone users have practiced getting instant services been used in MD5 encryption tools that may be vulnerable
through various kinds of mobile applications by inserting because of a short number of bits of MD5 and they have not
their very sensitive data: bank account numbers, credit card properly managed the sessions of mobile applications also.
numbers and health information, etc. Those kinds of user Then he has proposed to produce various security check
behaviors can also increase the vulnerabilities in this field. methods when developing applications for mobile devices.
According to the review, article which was written by The Growth of usage of Mobile Devices is Caused to
Pawel Wichbroth and Lukasz Lysik, they have identified Create Various Kinds of Security Challenges also. There
and analyzed existing threats for mobile devices and best can be Cate- Gorized few Prominent Security
practices for avoiding the mobile threats. They have Challenges because of threats and Vulnerabilities. [10]
analyzed the cur- rent mobile attacks and related security
codes for preventing those mobile attacks. The world Unsafe Data Storage – There may be a huge
economic forum of 2019 has presented 3 technologies: 5G problem when losing a mobile device or affect
networks and infrastructure, artificial intelligence, and bio- mobile application by some malicious code because
metrics technology to prevent mobile threats. [15] of losing sensitive data including personal
According to Nageen Saleem and four others have proposed information: name, address, banking information,
a solution to security threats that occur in the Android social network addresses, work information:
operating system. They have implemented architecture of company name, work position, and other official
quantum key distribution for Android-based op- erating docu- ments. [10]
systems to increase their efficiency of them. According to Mobile Browsing – most of the users use mobile
their system, the quantum key distribution method works as devices because of the feature of mobile browsing.
a guard to the Android operating system and can be used in But normally the users are unable to see the full web
the case of run-time kernel compromise to ensure the address or URL. Therefore, the users are unable to
security of the systems. [13] determine whether the URL or web address is safe
or unsafe. 32
Martin Butler and Rika Butler have done research to Multiple User Login – With the rapid growth of
reveal, how to affect the different kinds of mobile operating usage of social media, its’ single sign-on (SSO)
system users’ behaviors to threat of mobile security. They feature is created insecure status in mobile devices.
have conducted a study to investigate the behavior of mobile Hackers can obtain, login credentials of websites or
users in South Africa and reveal the different kinds of apps when users use the same login for multiple
operating systems like Android, iOS impact user behaviors. social network applications.
According to their analyzing results, the Android operating Client-Side Injection - Client-Side injection: Html
system is used widely all over the world, although there are injec- tion, SQL injection also may be caused by to
technical issues in the Android operating system. There are execution of some malicious programs on mobile
common different kinds of unsafe behavior among Android devices. These kinds of injections can harm target
users. They revealed that there was a considerable difference files or applications on mobile devices.
between users who use different kinds of operating systems
and age, gender, and frequency of mobile phone use are VI. MOBILE THREATS AND
caused to decide the behavior of mobile users. They prove VULNERABILITIES
that threat appraisal and a coping appraisal are influenced
mobile users’ threat avoidance. [2] Both capabilities of the hackers to hack the mobile
oper- ating systems and mobile companies’ security
IV. USAGE OF MOBILE DEVICES mechanisms are widening day by day. Therefore, advanced
mobile security policies should be implemented to protect
According to the Researchers . [7], [5], [3] the following mobile devices from various kinds of mobile threats. Some
Reasons are found to use Mobile Devices and can be kinds of mobile threats can be categorized as follows.
Categorized as follows.
Physical Threats
73 percent of people have used mobile devices to
open emails. Bluetooth –
Around 95 percent of users have logged into their The short-range radio technology (Bluetooth)
Face- book accounts and social media accounts which provides wireless technology for the short-range
from mobile phones. is caused to make many potential threats and
80 percent of people use mobile devices to search vulnerabilities. When two mobile devices connect and
some information from the internet. pair the security PIN, the malicious data can be
Privacy Threats –
Some special features in the mobile devices global
positioning system (GPS) help to attacker find the
user’s current location exactly. [11]
Network-based Threats
Some kinds of network-based threats can be
categorized as follows.