Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications

Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications

Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, Supeng Leng
Copyright: © 2013 |Volume: 5 |Issue: 2 |Pages: 17
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781466632660|DOI: 10.4018/jitn.2013040106
Cite Article Cite Article

MLA

Caushaj, Eralda, et al. "Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications." IJITN vol.5, no.2 2013: pp.66-82. http://doi.org/10.4018/jitn.2013040106

APA

Caushaj, E., Fu, H., Sethi, I., Badih, H., Watson, D., Zhu, Y., & Leng, S. (2013). Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 5(2), 66-82. http://doi.org/10.4018/jitn.2013040106

Chicago

Caushaj, Eralda, et al. "Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 5, no.2: 66-82. http://doi.org/10.4018/jitn.2013040106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user’s information? What are the threats and countermeasures that the users should be aware of? The aim of the authors’ paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.