Skip to main content

A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

The number of mobile devices that are getting connected to the Internet is on the rise and interconnectivity has brought together billions of devices in the cyber-sphere. The chapter focuses on security and privacy of mobile devices and systems for identifying security and privacy issues as well as the current measures of detecting and preventing such issues. The systematic review methodology will rely on the PRISMA checklist and flowchart to include and exclude papers in the review process. However, given the nature and debates around privacy and security in mobile systems, the search will be conducted in several databases which Digital library IEEE Xplore, Digital Library ACM, and the DBLP Computer Science Bibliography besides ProQuest Central and EBSCO. Given the number of databases that will be used to search for the articles, PICO will be used to prepare search strings and queries implemented in the databases. The results of the search will include descriptive statistics including distribution of articles per journal and year of publication as well as qualitative analysis of thematic areas emerging from the search string results. Finally, the findings and discussions will illuminate the problems identified, measures, and development in the provision of security and privacy in mobile systems. Probable research gaps and considerations for future studies will also be included in the conclusion section.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Au, M. H., & Choo, K.-K. R. (2017). Chapter 1 – Mobile security and privacy. In M. H. Au & K.-K. R. Choo (Eds.), Mobile security and privacy: Advances, challenges and future research directions (pp. 1–4). Boston: Syngress. https://doi.org/10.1016/B978-0-12-804629- 6.00001-8.

    Chapter  Google Scholar 

  2. Raggo, M. T., & Raggo, M. T. (2016). Chapter 3 – Mobile security countermeasures. In Mobile data loss (pp. 17–28). Boston: Syngress. https://doi.org/10.1016/B978-0- 12-802864-3.00003-9.

    Chapter  Google Scholar 

  3. Tully, S., & Mohanraj, Y. (2017). Chapter 2 – Mobile security: A practitioner’s perspective. In Mobile security and privacy (pp. 5–55). Boston: Syngress. https://doi.org/10.1016/B978- 0-12-804629-6.00002-X.

    Chapter  Google Scholar 

  4. Rawat, D. B. (2013). Security, privacy, trust, and resource management in mobile and wireless communications. Hershey: IGI Global.

    Google Scholar 

  5. Huang, K., & Zhou, X. (2015). Cutting the last wires for mobile communications by microwave power transfer. IEEE Communications Magazine, 53(6), 86–93.

    Article  MathSciNet  Google Scholar 

  6. Gupta, B. B., Agrawal, D., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey: IGI Publishing. https://doi.org/10.4018/978-1-5225-0105-3.

    Book  Google Scholar 

  7. Gupta, B. B., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. Boca Raton: Auerbach Publishers. Retrieved from https://books.google.co.ke/books?id=rXBRuQEACAAJ.

    Google Scholar 

  8. Akram, R. N., Chen, H. H., Lopez, J., Sauveron, D., & Yang, L. T. (2018). Security, privacy and trust of user-centric solutions. Future Generation Computer Systems, 80, 417–420. https://doi.org/10.1016/j.future.2017.11.026.

    Article  Google Scholar 

  9. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164. https://doi.org/10.1016/j.comnet.2014.11.008.

    Article  Google Scholar 

  10. Sha, K., Wei, W., Andrew Yang, T., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future Generation Computer Systems, 83, 326–337. https://doi.org/10.1016/j.future.2018.01.059.

    Article  Google Scholar 

  11. Ferrari, R. (2015). Writing narrative style literature reviews. Medical Writing, 24, 230–235. https://doi.org/10.1179/2047480615Z.000000000329.

    Article  Google Scholar 

  12. Nie, Y., & Ma, K.-K. (2002). Adaptive rood pattern search for fast block-matching motion estimation. IEEE Transactions on Image Processing, 11(12), 1442–1449.

    Article  Google Scholar 

  13. Moher, D., Liberati, A., & Tetzlaff, J. (2009). PRISMA 2009 flow diagram. The PRISMA Statement. https://doi.org/10.1371/journal.pmed1000097.

  14. Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., Altman, D., Antes, G., et al. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLoS Medicine, 6(7), e1000097. https://doi.org/10.1371/journal.pmed.1000097.

    Article  Google Scholar 

  15. Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Engineering, 2, 1051. https://doi.org/10.1145/1134285.1134500.

    Article  Google Scholar 

  16. Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., & Linkman, S. (2009). Systematic literature reviews in software engineering – A systematic literature review. Information and Software Technology, 51(1), 7–15. https://doi.org/10.1016/j.infsof.2008.09.009.

    Article  Google Scholar 

  17. Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2006.07.009.

    Article  Google Scholar 

  18. Budgen, D., & Brereton, P. (2006). Performing systematic literature reviews in software engineering. In Proceeding of the 28th International Conference on Software Engineering – ICSE’06. https://doi.org/10.1145/1134285.1134500.

    Chapter  Google Scholar 

  19. Tarhan, A., Turetken, O., & Reijers, H. A. (2016). Business process maturity models: A systematic literature review. Information and Software Technology. https://doi.org/10.1016/j.infsof.2016.01.010.

    Article  Google Scholar 

  20. Biolchini, J., Mian, P. G., Candida, A., & Natali, C. (2005). Systematic review in software engineering. Engineering, 679, 45. https://doi.org/10.1007/978-3-540-70621-2.

    Article  Google Scholar 

  21. Cerchione, R., & Esposito, E. (2016). A systematic review of supply chain knowledge management research: State of the art and research opportunities. International Journal of Production Economics. https://doi.org/10.1016/j.ijpe.2016.09.006.

    Article  Google Scholar 

  22. Pearson, F. (2014). Systematic approaches to a successful literature review. Educational Psychology in Practice. https://doi.org/10.1080/02667363.2014.900913.

    Article  Google Scholar 

  23. Selby, A., & Smith-Osborne, A. (2013). A systematic review of effectiveness of complementary and adjunct therapies and interventions involving equines. Health Psychology. https://doi.org/10.1037/a0029188.

    Article  Google Scholar 

  24. Wallace, B. C., Kuiper, J., Sharma, A., Zhu, M., Marshall, I. J., & Kuiper, J. (2016). Extracting PICO sentences from clinical trial reports using supervised distant supervision. Journal of Machine Learning Research, 17, 132.

    MathSciNet  Google Scholar 

  25. Aslam, S., & Emmanuel, P. (2010). Formulating a researchable question: A critical step for facilitating good clinical research. Indian Journal of Sexually Transmitted Diseases and AIDS, 31(1), 47–50. https://doi.org/10.4103/0253-7184.69003.

    Article  Google Scholar 

  26. Cooke, A., Smith, D., & Booth, A. (2012). Beyond PICO: The SPIDER tool for qualitative evidence synthesis. Qualitative Health Research. https://doi.org/10.1177/1049732312452938.

    Article  Google Scholar 

  27. O’Sullivan, D., Wilk, S., Michalowski, W., & Farion, K. (2013). Using PICO to align medical evidence with MDs decision making models. In Studies in health technology and informatics. https://doi.org/10.3233/978-1-61499-289-9-1057.

    Chapter  Google Scholar 

  28. Santos, C. M. d. C., Pimenta, C. A. d. M., & Nobre, M. R. C. (2007). The PICO strategy for the research question construction and evidence search. Revista Latino-Americana de Enfermagem. https://doi.org/10.1590/S0104-11692007000300023.

    Article  Google Scholar 

  29. Rivas-Ruiz, R., & Talavera, J. O. (2012). VII. Systematic search: how to look for medical documents. Ciudad de México: Revista Médica Del Instituto Mexicano Del Seguro Social.

    Google Scholar 

  30. Shetty, S., Pitti, V., Babu, C. L. S., Kumar, G. P. S., & Deepthi, B. C. (2010). Bruxism: A literature review. Journal of Indian Prosthodontist Society. https://doi.org/10.1007/s13191-011-0041-5.

    Article  Google Scholar 

  31. Timmins, F., & McCabe, C. (2005). How to conduct an effective literature search. Nursing Standard. https://doi.org/10.7748/ns2005.11.20.11.41.c4010.

    Article  Google Scholar 

  32. Çoğaltay, N., & Karadağ, E. (2015). Introduction to meta-analysis. In Leadership and organizational outcomes: Meta-analysis of empirical studies. https://doi.org/10.1007/978- 3-319-14908-0_2.

    Chapter  Google Scholar 

  33. Khoury, B., Lecomte, T., Fortin, G., Masse, M., Therien, P., Bouchard, V., et al. (2013). Mindfulness-based therapy: A comprehensive meta-analysis. Clinical Psychology Review. https://doi.org/10.1016/j.cpr.2013.05.005.

    Article  Google Scholar 

  34. Smith, B. R., & Blumstein, D. T. (2008). Fitness consequences of personality: A meta-analysis. Behavioral Ecology. https://doi.org/10.1093/beheco/arm144.

    Article  Google Scholar 

  35. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems. https://doi.org/10.1016/j.is.2014.07.006.

    Article  Google Scholar 

  36. Hashem, I. A. T., Yaqoob, I., Badrul Anuar, N., Mokhtar, S., Gani, A., & Ullah Khan, S. (2014). The rise of “Big Data” on cloud computing: Review and open research issues. Information Systems. https://doi.org/10.1016/j.is.2014.07.006.

    Article  Google Scholar 

  37. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27. https://doi.org/10.1016/j.jisa.2017.11.002.

    Article  Google Scholar 

  38. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697. https://doi.org/10.1016/j.procs.2017.12.089.

    Article  Google Scholar 

  39. Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78, 964–975. https://doi.org/10.1016/J.FUTURE.2016.11.031.

    Article  Google Scholar 

  40. Khelifi, H., Luo, S., Nour, B., & Shah, S. C. (2018). Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems, 2018, 5672154:1–5672154:11. https://doi.org/10.1155/2018/5672154.

    Article  Google Scholar 

  41. Rauniyar, A., Hagos, D. H., & Shrestha, M. (2018, 2018). A crowd-based intelligence approach for measurable security, privacy, and dependability in internet of automated vehicles with vehicular fog. Mobile Information Systems, 7905960. https://doi.org/10.1155/2018/7905960.

    Article  Google Scholar 

  42. Volk, M., Sterle, J., & Sedlar, U. (2015). Safety and privacy considerations for mobile application design in digital healthcare. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2015/549420.

    Article  Google Scholar 

  43. Adat, V., & Gupta, B. B. (2017). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 1–19. https://doi.org/10.1007/s11235-017-0345-9.

    Article  Google Scholar 

  44. Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., & Jin, Y. (2018). Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security, 2(2), 97–110. https://doi.org/10.1007/s41635-017-0029-7.

    Article  Google Scholar 

  45. Chen, X. M., & Zou, S. H. (2014). A secure mobile payments protocol based on ECC. Applied Mechanics and Materials, 519–520, 151–154. https://doi.org/10.4028/www.scientific.net/AMM.519-520.151.

    Article  Google Scholar 

  46. Das, A., & Khan, H. U. (2016). Security behaviors of smartphone users. Information and Computer Security, 24(1), 116–134. https://doi.org/10.1108/ICS-04-2015-0018.

    Article  Google Scholar 

  47. Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in smart cities: Safety, security and privacy. Journal of Advanced Research. https://doi.org/10.1016/j.jare.2014.02.006.

    Article  Google Scholar 

  48. Kotz, D., Gunter, C. A., Kumar, S., Weiner, J. P., Arora, S., Yttri, J., et al. (2014). Privacy and security in mobile health (mHealth) research. Alcohol Research: Current Reviews. https://doi.org/10.1177/1357633X13487100.

    Article  Google Scholar 

  49. Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security – SOUPS’12. https://doi.org/10.1145/2335356.2335358.

    Chapter  Google Scholar 

  50. Kang, S., Kim, J., & Hong, M. (2013). Go anywhere: User-verifiable authentication over distance-free channel for mobile devices. Personal and Ubiquitous Computing, 17(5), 933–943. https://doi.org/10.1007/s00779-012-0531-4.

    Article  Google Scholar 

  51. Martínez-Pérez, B., de la Torre-Díez, I., & López-Coronado, M. (2015). Privacy and security in mobile health apps: A review and recommendations. Journal of Medical Systems. https://doi.org/10.1007/s10916-014-0181-3.

  52. Arora, S., Yttri, J., & Nilsen, W. (2014). Privacy and security in mobile health (mHealth) research. Alcohol Research, 36(1), 143–150. Retrieved from https://search.proquest.com/docview/1685862596?accountid=145382.

    Google Scholar 

  53. Garg, S. K., Lyles, C. R., Ackerman, S., Handley, M. A., Schillinger, D., Gourley, G., et al. (2016). Qualitative analysis of programmatic initiatives to text patients with mobile devices in resource-limited health systems. BMC Medical Informatics and Decision Making, 16, 16. https://doi.org/10.1186/s12911-016-0258-7.

    Article  Google Scholar 

  54. Jiang, Y., & Liu, J. (2017). Health monitoring system for nursing homes with lightweight security and privacy protection. Journal of Electrical and Computer Engineering, 2017, 1360289. https://doi.org/10.1155/2017/1360289.

    Article  Google Scholar 

  55. Mohit, P., Amin, R., Karati, A., Biswas, G. P., & Khan, M. K. (2017). A standard mutual authentication protocol for cloud computing based health care system. Journal of Medical Systems, 41(4), 1–13. https://doi.org/10.1007/s10916-017-0699-2.

    Article  Google Scholar 

  56. Rakshitha, P., & Immanuel, A. (2017). A survey on context awareness security in healthcare. International Journal of Advanced Research in Computer Science, 8(3). Retrieved from https://search.proquest.com/docview/1901458446?accountid=145382.

  57. Wazid, M., Zeadally, S., Das, A. K., & Odelu, V. (2016). Analysis of security protocols for mobile healthcare. Journal of Medical Systems, 40(11), 1–10. https://doi.org/10.1007/s10916-016-0596-0.

    Article  Google Scholar 

  58. Yeh, K.-H. (2016). BSNCare+: A robust IoT-oriented healthcare system with non-repudiation transactions. Applied Sciences, 6(12), 418. https://doi.org/10.3390/app6120418.

    Article  Google Scholar 

  59. Baig, M. M., Gholamhosseini, H., & Connolly, M. J. (2015). Mobile healthcare applications: System design review, critical issues and challenges. Australasian Physical & Engineering Sciences in Medicine, 38(1), 23–38. https://doi.org/10.1007/s13246-014-0315-4.

    Article  Google Scholar 

  60. Chin-I, L., & Hung-Yu, C. (2015). An elliptic curve cryptography-based RFID authentication securing e-health system. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2015/642425.

    Article  Google Scholar 

  61. Dong, Q., Guan, Z., Gao, K., & Chen, Z. (2015). SCRHM: A secure continuous remote health monitoring system. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2015/392439.

    Article  Google Scholar 

  62. Jiang, S., Zhu, X., & Wang, L. (2015). EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks. Sensors, 15(9), 22419–22438. https://doi.org/10.3390/s150922419.

    Article  Google Scholar 

  63. Watson, L., Pathiraja, F., Depala, A., O’Brien, B., & Beyzade, S. (2016). Ensuring safe communication in health care: A response to Johnston et al on their paper “Smartphones let surgeons know WhatsApp: An analysis of communication in emergency surgical teams”. The American Journal of Surgery, 211(1), 302–303. https://doi.org/10.1016/j.amjsurg.2015.04.017.

    Article  Google Scholar 

  64. Yang, H., Kim, H., & Mtonga, K. (2015). An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-To-Peer Networking and Applications, 8(6), 1059–1069. https://doi.org/10.1007/s12083-014-0299-6.

    Article  Google Scholar 

  65. Bloem, C. M., & Miller, A. C. (2013). Disasters and women’s health: Reflections from the 2010 earthquake in Haiti. Prehospital and Disaster Medicine, 28(2), 150–154. https://doi.org/10.1017/S1049023X12001677.

    Article  Google Scholar 

  66. Bloem, C., & Miller, A. (2011). (P1-20) disasters and women’s health: The 2010 earthquake in Haiti. Prehospital and Disaster Medicine, 26(S1), s113. https://doi.org/10.1017/S1049023X11003529.

    Article  Google Scholar 

  67. Lee, C., Hsu, C., Lai, Y., & Vasilakos, A. (2013). An enhanced mobile-healthcare emergency system based on extended chaotic maps. Journal of Medical Systems, 37(5), 1–9973. https://doi.org/10.1007/s10916-013-9973-0.

    Article  Google Scholar 

  68. Safavi, S., & Shukur, Z. (2014). Conceptual privacy framework for health information on wearable device. PLoS One, 9(12). https://doi.org/10.1371/journal.pone.0114306.

    Article  Google Scholar 

  69. Shin, M. S., Jeon, H. S., Ju, Y. W., Lee, B. J., & Jeong, S.-P. (2015). Constructing RBAC based security model in u-healthcare service platform. The Scientific World Journal. https://doi.org/10.1155/2015/937914.

    Article  Google Scholar 

  70. Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1–43.

    Article  Google Scholar 

  71. Mendez, I., & VandenHof, M. C. (2013). Mobile remote-presence devices for point-of-care health care delivery. Canadian Medical Association Journal, 185(17), 1512–1516. Retrieved from https://search.proquest.com/docview/1476500625?accountid=145382.

    Article  Google Scholar 

  72. Hauk, L. (2018). Benefits and challenges of remote video auditing in the OR. AORN Journal, 107(2), P7–P10. https://doi.org/10.1002/aorn.12078.

    Article  Google Scholar 

  73. Belsis, P., & Pantziou, G. (2014). A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Personal and Ubiquitous Computing, 18(1), 61–74. https://doi.org/10.1007/s00779-012-0618-y.

    Article  Google Scholar 

  74. Chen, T., Chung, Y., & Lin, F. Y. S. (2012). A study on agent-based secure scheme for electronic medical record system. Journal of Medical Systems, 36(3), 1345–1357. https://doi.org/10.1007/s10916-010-9595-8.

    Article  Google Scholar 

  75. Moorman, B. A., & Cockle, R. A. (2013). Medical device integration using mobile telecommunications infrastructure. Biomedical Instrumentation & Technology, 47(3), 224–232. Retrieved from https://search.proquest.com/docview/1366370612?accountid=145382.

    Article  Google Scholar 

  76. Mulvaney, D., Woodward, B., Datta, S., Harvey, P., Vyas, A., Thakker, B., et al. (2012). Monitoring heart disease and diabetes with mobile internet communications. International Journal of Telemedicine and Applications, 2012, 12. https://doi.org/10.1155/2012/195970.

    Article  Google Scholar 

  77. Lou, W., Liu, W., Zhang, Y., & Fang, Y. (2009). SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 15(3), 279–294. https://doi.org/10.1007/s11276-007-0039-4.

    Article  Google Scholar 

  78. Enenkel, M., See, L., Karner, M., Álvarez, M., Rogenhofer, E., Baraldès-Vallverdú, C., et al. (2015). Food security monitoring via mobile data collection and remote sensing: Results from the Central African Republic. PLoS One, 10(11). https://doi.org/10.1371/journal.pone.0142030.

    Article  Google Scholar 

  79. Gheorghe, M. (2014). Mobile cloud computing for telemedicine solutions. Informatica Economica, 18(4), 50–61. Retrieved from https://search.proquest.com/docview/1649081693?accountid=145382.

    Article  Google Scholar 

  80. Langovic, Z., Pazun, B., & Grujcic, Z. (2018). Processor systems security impact on business systems. In Economic and social development: Book of proceedings (pp. 443–449). Varazdin: Varazdin Development and Entrepreneurship Agency (VADEA). Retrieved from https://search.proquest.com/docview/2058257359?accountid=145382.

    Google Scholar 

  81. Sengupta, S., & Sarkar, P. (2015). An augmented level of security for Bluetooth devices controlled by smart phones and ubiquitous handheld gadgets. International Journal of Information Engineering and Electronic Business, 7(4), 58–75. https://doi.org/10.5815/ijieeb.2015.04.08.

    Article  Google Scholar 

  82. Taylor, E. (2016). Mobile payment technologies in retail: A review of potential benefits and risks. International Journal of Retail and Distribution Management, 44(2), 159–177. Retrieved from https://search.proquest.com/docview/1767676353?accountid=145382.

    Article  Google Scholar 

  83. Chen, H., Lo, J., & Yeh, C. (2012). An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915. https://doi.org/10.1007/s10916-012-9862-y.

    Article  Google Scholar 

  84. Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120. https://doi.org/10.1007/s10660-014-9165-0.

    Article  Google Scholar 

  85. Gupta, A., Kalra, A., Boston, D., & Borcea, C. (2009). MobiSoC: A middleware for mobile social computing applications. Mobile Networks and Applications, 14(1), 35–52. https://doi.org/10.1007/s11036-008-0114-9.

    Article  Google Scholar 

  86. Kokemüller, J., & Roßnagel, H. (2012). Secure mobile sales force automation: The case of independent sales agencies. Information Systems and e-Business Management, 10(1), 117–133. https://doi.org/10.1007/s10257-010-0157-x.

    Article  Google Scholar 

  87. Yazji, S., Scheuermann, P., Dick, R. P., Trajcevski, G., & Jin, R. (2014). Efficient location aware intrusion detection to protect mobile devices. Personal and Ubiquitous Computing, 18(1), 143–162. https://doi.org/10.1007/s00779-012-0628-9.

    Article  Google Scholar 

  88. Youn, T., Kim, J., & Lim, M. (2014). Study on two privacy-oriented protocols for information communication systems. Journal of Intelligent Manufacturing, 25(2), 339–345. https://doi.org/10.1007/s10845-012-0654-5.

    Article  Google Scholar 

  89. Al-fayoumi, M. A., & Shilbayeh, N. F. (2014). Cloning SIM cards usability reduction in mobile networks. Journal of Network and Systems Management, 22(2), 259–279. https://doi.org/10.1007/s10922-013-9299-8.

    Article  Google Scholar 

  90. Moon, S., & Yoon, C. (2015). Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. Peer-To-Peer Networking and Applications, 8(4), 596–609. https://doi.org/10.1007/s12083-014-0265-3.

    Article  Google Scholar 

  91. Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., & Hoffmann, J. (2015). Mobile-sandbox: Combining static and dynamic analysis with machine-learning techniques. International Journal of Information Security, 14(2), 141–153. https://doi.org/10.1007/s10207-014-0250-0.

    Article  Google Scholar 

  92. Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881–1891. https://doi.org/10.1007/s00779-014-0788-x.

    Article  Google Scholar 

  93. Hennig, N. (2018). Assessing your security and privacy needs. Library Technology Reports, 54(3), 5. Retrieved from https://search.proquest.com/docview/2020766935?accountid=145382.

    Google Scholar 

  94. Wang, M., Yan, Z., & Niemi, V. (2017). UAKA-D2D: Universal authentication and key agreement protocol in D2D communications. Mobile Networks and Applications, 22(3), 510–525. https://doi.org/10.1007/s11036-017-0870-5.

    Article  Google Scholar 

  95. Kaur, K., & Chuchra, R. (2017). Proposing enhanced Na Gaun Technique (Engt) for resource block allocation in Lte(long term evolution) systems for improving quality of service. International Journal of Advanced Research in Computer Science, 8(7). Retrieved from https://search.proquest.com/docview/1931114880?accountid=145382.

  96. Caballero-Gil, C., Caballero-Gil, P., Molina-Gil, J., Martín-Fernández, F., & Loia, V. (2017). Trust-based cooperative social system applied to a carpooling platform for smartphones. Sensors, 17(2), 245. https://doi.org/10.3390/s17020245.

    Article  Google Scholar 

  97. Militano, L., Orsino, A., Araniti, G., & Iera, A. (2017). NB-IoT for D2D-enhanced content uploading with social trustworthiness in 5G systems. Future Internet, 9(3), 31. https://doi.org/10.3390/fi9030031.

    Article  Google Scholar 

  98. Sherkar, R. M. (2015). An extension to android security framework. International Journal of Advanced Research in Computer Science, 6(1). Retrieved from https://search.proquest.com/docview/1674900061?accountid=145382.

  99. Su-Wan, P., Lim, J., & Kim, J. N. (2015). A secure storage system for sensitive data protection based on mobile virtualization. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2015/929380.

    Article  Google Scholar 

  100. Dmitrienko, A., Liebchen, C., Rossow, C., & Sadeghi, A. R. (2014). On the (in)security of mobile two-factor authentication. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). https://doi.org/10.1007/978-3-662-45472-5_24.

    Chapter  Google Scholar 

  101. Školc, G., & Markelj, B. (2018). Smart cars and information security TT – Pametni avtomobili in informacijska varnost. Varstvoslovje, 20(2), 218–236. Retrieved from https://search.proquest.com/docview/2095680841?accountid=145382.

    Google Scholar 

  102. Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.03.029.

    Article  Google Scholar 

  103. Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG data collection–processing and analysis in smart buildings. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.09.082.

    Article  Google Scholar 

  104. Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2844727.

    Article  Google Scholar 

  105. Bowen, K., & Pistilli, M. D. (2012). Student preferences for mobile app usage. Research Bulletin. https://doi.org/10.1002/pros.20492.

    Article  Google Scholar 

  106. Homscheid, D., Kilian, T., & Schaarschmidt, M. (2015). Offen versus geschlossen-Welchen Zusammenhang gibt es zwischen Apple iOS-und Android-App-Entwicklern? In Wirtschaftsinformatik (pp. 1191–1205).

    Google Scholar 

  107. Hu, H., Bezemer, C. P., & Hassan, A. E. (2018). Studying the consistency of star ratings and the complaints in 1 & 2-star user reviews for top free cross-platform Android and iOS apps. Empirical Software Engineering. https://doi.org/10.1007/s10664-018-9604-y.

    Article  Google Scholar 

  108. Saltaformaggio, B., Choi, H., Johnson, K., Kwon, Y., Zhang, Q., Zhang, X., et al. (2016). Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT 2016). https://doi.org/10.1101/lm.529807.

    Chapter  Google Scholar 

  109. Ubhi, H. K., Kotz, D., Michie, S., van Schayck, O. C. P., & West, R. (2017). A comparison of the characteristics of iOS and Android users of a smoking cessation app. Translational Behavioral Medicine. https://doi.org/10.1007/s13142-016-0455-z.

    Article  Google Scholar 

  110. Barrera, D., & Van Oorschot, P. (2011). Secure software installation on smartphones. IEEE Security and Privacy, 9, 42–48. https://doi.org/10.1109/MSP.2010.202.

    Article  Google Scholar 

  111. Han, J., Yan, Q., Gao, D., Zhou, J., & Deng, R. H. (2013). Comparing mobile privacy protection through cross-platform applications. In Proceedings of the network and distributed system security symposium.

    Google Scholar 

  112. Kodali, R. K., Jain, V., Bose, S., & Boppana, L. (2017). IoT based smart security and home automation system. In Proceeding – IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. https://doi.org/10.1109/CCAA.2016.7813916.

    Chapter  Google Scholar 

  113. Michalevsky, Y., Boneh, D., & Nakibly, G. (2014). Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security 14). https://doi.org/10.1109/IEMBS.2009.5333489.Active.

    Chapter  Google Scholar 

  114. Sivaraman, V., Chan, D., Earl, D., & Boreli, R. (2016). Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks – WiSec’16. https://doi.org/10.1145/2939918.2939925.

    Chapter  Google Scholar 

  115. Yoon, H. S., & Occeña, L. (2014). Impacts of customers’ perceptions on internet banking use with a smart phone. Journal of Computer Information Systems. https://doi.org/10.1080/08874417.2014.11645699.

    Article  Google Scholar 

  116. Shukla, D., Kumar, R., Serwadda, A., & Phoha, V. V. (2014). Beware, your hands reveal your secrets! In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security – CCS’14. https://doi.org/10.1145/2660267.2660360.

    Chapter  Google Scholar 

  117. Younis, A. A., Malaiya, Y. K., & Ray, I. (2014). Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability. In Proceedings – 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE 2014. https://doi.org/10.1109/HASE.2014.10.

    Chapter  Google Scholar 

  118. Loukas, G. (2015). Cyber-physical attack steps. In Cyber-physical attacks. Oxford: Butterworth-Heinemann. https://doi.org/10.1016/B978-0-12-801290-1.00005-9.

    Chapter  Google Scholar 

  119. Weber, J., Azad, M., Riggs, W., & Cherry, C. R. (2018). The convergence of smartphone apps, gamification and competition to increase cycling. Transportation Research Part F: Traffic Psychology and Behaviour. https://doi.org/10.1016/j.trf.2018.04.025.

    Article  Google Scholar 

  120. Wang, X., Shi, J., & Guo, L. (2013). Towards analyzing and improving service accessibility under resource enumeration attack. Procedia Computer Science, 17, 836–843. https://doi.org/10.1016/j.procs.2013.05.107.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Alloghani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alloghani, M., Baker, T., Al-Jumeily, D., Hussain, A., Mustafina, J., Aljaaf, A.J. (2020). A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics