SlideShare a Scribd company logo
1 of 26
Download to read offline
Mobile Technologies
Unit 2.1
DESIGN MOBILE COMPUTING
ARCHITECTURE
Ms. Swapnali Pawar
Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Index
• Security Concerns Related to Mobile Computing
• Guidelines for Mobile Computing Security
• What is Middleware?
• What is Gateway ?
• Making Existing Application Mobile‐Enabled
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Security Concerns Related to Mobile
Computing
• Confidentiality: This is used to prevent unauthorized users from
gaining access to any particular user's critical and confidential
information.
• Integrity: This is used to ensure that any type of unauthorized
modification, destruction or creation of information cannot be done.
• Availability: The availability is used to ensure that authorized users get
the required access whenever they need it.
• Legitimate: This is used to ensure that only authorized, and legitimate
users have access to the services.
• Accountability: Accountability is used to ensure that the users will be
responsible for their security-related activities by arranging the users and
their activities in a linked form.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Security Concerns Related to Mobile Computing
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Wireless Security Issues
Denial of Service (DOS) attacks
The denial of services or DOS attacks is one of the most common attacks of all
kinds of networks and especially in a wireless network. It prevents users from
using network services because the attacker sends a large amount of unnecessary
data or connection requests to the communication server. It causes a slow network,
and therefore the users cannot get benefitted from using its service.
Traffic Analysis
Traffic analysis is used to identify and monitor communication between users. In
this process, the service provider listens the traffic flowing in the wireless channel
to access the private information of users affected by the attacker.
Eavesdropping
It specifies that the attacker can log on to the wireless network and access sensitive
data if the wireless network was not secure enough. This can also be done if the
information is not encrypted.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Session Interception and Messages Modification
It specifies that the attacker can intercept the session and modify
the transmitted data in this session. This scenario is called "man in
the middle." It inserts the attacker's host between the sender and
receiver host.
Spoofing
In this security issue, the attacker impersonates him as an
authorized account of another user and tries to access the sensitive
data and unauthorized services.
Captured and Retransmitted Messages
In this security issue, the attacker can get some of the network
services by getting unauthorized access. After capturing the
message, he/she can reply to it with some modifications to the same
destination
Wireless Security Issues
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Wireless Security
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Device Security Issues
• Push Attacks
In the push attack, the attacker creates a malicious code at the user's
mobile device by hacking it and then he/she may spread it to affect
other elements of the network.
• Pull Attacks
The pull attack is a type of attack where the attacker controls the
device and handles it in his/her way. He can decide which emails
they want to receive. In this attack, the user can decide about the
obtained data by the device itself.
• Forced De-authentication
In this security issue, the attackers convince the mobile end-point or
the mobile user to drop its connection and re-connection to get a new
signal. Within this process, they insert their device between the
mobile device and the network and steal the information or do the
fraud.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Device Security Issues
• Multi-protocol Communication
The multi-protocol communication provides the ability of many
mobile devices to operate using multiple protocols. For example, A
cellular provider's network protocol. Most of the protocols have
some security loopholes, which help the attacker to exploit this
weakness and access to the device.
• Mobility
This security issue may occur because of the mobility of the users
and the mobile devices. You may face these security threats due to a
user's location, so you must replicate the user profiles at different
locations to allow roaming via different places without any concern
regarding access to personal and sensitive data in any place and at
any time. This repetition of sensitive data on different sites can
increase seethe chances of security threats.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
• Disconnections
These types of security issues occur when mobile devices go to
different places. It occurs in the form of frequent disconnections
caused by external parties resulting in the handoff.
Device Security Issues
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Personnel security issues or insider attacks
How to handle security issues?
The company should hire qualified personnel.
You should install security hardware and software.
You should ensure that the data stored in the mobile devices are
encrypted and audited.
Educate the users on proper mobile computing ethics and security
issues.
You must ensure that the mobile devices are configured with a power-
on authentication to prevent unauthorized access if lost or stolen.
You must ensure that anti-virus software is installed on mobile devices.
Make sure that the firewall client is installed on mobile devices.
Make your mobile devices encrypted with a strong password.
Encrypt your data stored in the secondary storage devices such as
Memory Sticks, Data card, removable USB etc.
Ensure that the Bluetooth, Wi-Fi, etc. enabled mobile devices are turned
off when you are not using them.
Make periodic backups of your mobile devices on a data server.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Guidelines for Mobile Computing Security
1. Encryption: Mobile devices that do store sensitive data can be protected by
means of encryption systems. Automatic encryption/decryption systems exist, but
are less secure than systems which require the user to enter a password at the
beginning of every session. Both Android and Apple iOS devices can be set up to
utilize encryption capabilities.
2. External Identification: End users should label their mobile devices
with their name and telephone contact information so lost devices can be returned
to them, even after their battery has gone dead.
3. Limiting Data Storage: One of the best ways to prevent the
compromise or loss of sensitive data is not to store it on a mobile device. Such
data can be stored in the cloud or accessed from a proprietary server. Naturally,
means of access must be thoroughly secured, or there is no advantage to be gained
from keeping sensitive data off a mobile device.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
4. Lost Device Locator and Data Eraser
Systems: Depending on the mobile device and its operating systems,
there are various technologies that enable end users to locate a lost device
(even if it's just between the couch cushions). Failing that, there are ways to
remotely erase sensitive data. Encourage end users to enroll their devices in a
good system, and to learn how to use it.
5. Passwords and Timeouts: End users should set a password and a
relatively brief timer to shut down and lock their mobile devices when left idle
for even a few minutes. Passwords and timeouts prevent—or at least delay—
unauthorized users from gaining access to sensitive data not only on lost or
stolen devices, but also on devices left unattended in homes and offices.
6. Trusted Sources: Mobile devices can add software from a variety of
sources, but end users should rely only on trusted sources, such as the Apple
iTunes Store, Google Play, or the Amazon App Store for Android. Other
sources are less likely to thoroughly search for and prevent software
contaminated by viruses or other malware.
Guidelines for Mobile Computing Security
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
What is Middleware?
Middleware is Software that provides a link
between separate software applications. It is a layer
that lies between the operating system and
applications.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Use of Middleware:
• Provide interaction with another service or
application.
• Filter data to make them friendly usable.
• Make an application independent from network
services.
• Make an application reliable and always
available.
• Add complementary attributes like semantics.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Types of Middleware
1. Communication Middleware : Communication Middleware is used
to connect one application with another application. For Example
connecting one application with another application using telnet.
2. Message Oriented Middleware: It supports the receiving and
sending of messages over distributed applications. It enables
applications to be disbursed over various platforms. It makes the
process of creating software applications across many operating
systems. It makes network protocols less complicated. It holds many
advantages over middleware alternatives and is one of the most
widely used types of middleware.
3. Object Oriented Middleware : Object Oriented Middleware is also
known as an object request broker. It provides the facility to send
objects and request services via an object oriented system. In short,
it manages the communication between objects.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
4. Remote Procedure Call (RPC) Middleware : It provides the
facility to calls procedures on remote systems and is used to perform
synchronous or asynchronous interactions between applications or
systems. It is usually utilized within a software application.
5. Database Middleware: It provides direct access to databases
and direct interaction with databases, There are many database
gateways and connectivity options and you simply have to see what
will best work for your necessary solution. This is the most general
and commonly known type of middleware. This includes SQL
database software.
6. Transaction Middleware :This type of middleware includes
applications like transaction processing monitors. It also encompasses
web application servers, These types of middleware are becoming
more and more common today.
Types of Middleware
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
7. Embedded Middleware : This type of middleware allows the
facility of communication and integration of services with an
interface of software or firmware. It acts as a liaison between
embedded applications and the real time operating system.
7. Content-Centric Middleware: This type of middleware
allows you to abstract specific content without worry of how it is
obtained. This is done through a simple provide / consume
abstraction. It is similar to publish / subscribe middleware, which
is another type of this software that is often used as a part of web
based applications.
Types of Middleware
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Middleware
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
What is Gateway ?
Gateways are required when the networks
between the device and the middleware having
different set of protocol.
For Example: an IVR (Interactive Voice
Response) Gateway is used to interface voice
with a computer. WAP Gateway is used to
access internet on mobile phones
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar
Making Existing Application Mobile‐Enabled
There are many applications that are now being used within the intranet
or the corporate network. These application need to be made ubiquitous
and mobile computing capable. There are many ways by which this can
be achieved:
• Enhance existing application take the current application.
Enhance the application to support mobile computing.
• Rent an application from an ASP, there are many organizations
who develop ubiquitous application and rent the same at a fee.
• Write a new application, develop a new application to meet the
new business requirement of the mobile computing.
• Buy a packaged solution, there are many companies who are
offering packaged solutions for various business areas starting from
manufacturing to sales and marketing. Buy and install one.
• Bridge the gap through middleware, use different middleware
techniques to facelift and mobile computing enable the existing
application.
MT Unit 2-Design Mobile Computing
Architecture ~Swapnali Pawar

More Related Content

What's hot

Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technologymktgmobile
 
Issues in mobile communication
Issues in mobile communicationIssues in mobile communication
Issues in mobile communicationhina firdaus
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computingSandeep Singh Saini
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing IntroductionThenraja Vettivelraj
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)cegonsoft1999
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computingjeremyjshafer
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
Mobile computing
Mobile computingMobile computing
Mobile computinglalit arora
 
Mobile computing
Mobile computingMobile computing
Mobile computingpooja s p
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computingSudipto Rocksandrules
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computingRashid Shahariar
 

What's hot (20)

Future of mobile technology
Future of mobile technologyFuture of mobile technology
Future of mobile technology
 
Issues in mobile communication
Issues in mobile communicationIssues in mobile communication
Issues in mobile communication
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Mobile Computing Introduction
Mobile Computing IntroductionMobile Computing Introduction
Mobile Computing Introduction
 
Presentation mobile computing(1)
Presentation mobile computing(1)Presentation mobile computing(1)
Presentation mobile computing(1)
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Nomadic Computing
Nomadic ComputingNomadic Computing
Nomadic Computing
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Unit 1
Unit 1Unit 1
Unit 1
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Current trends in mobile computing
Current trends in mobile computingCurrent trends in mobile computing
Current trends in mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The future of mobile computing
The future of mobile computingThe future of mobile computing
The future of mobile computing
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 

Similar to Unit 2.design computing architecture 2.1

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using SensorsEditor IJCATR
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network SecuritySHUBHA CHATURVEDI
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile applicationVikrant Kansal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network IJECEIAES
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptxKellyIsaac3
 

Similar to Unit 2.design computing architecture 2.1 (20)

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Mobile Device Protection Using Sensors
Mobile Device Protection Using SensorsMobile Device Protection Using Sensors
Mobile Device Protection Using Sensors
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile Environment
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
B010331019
B010331019B010331019
B010331019
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 

More from Swapnali Pawar

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android Swapnali Pawar
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingSwapnali Pawar
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to iosSwapnali Pawar
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demoSwapnali Pawar
 
View & index in SQL
View & index in SQLView & index in SQL
View & index in SQLSwapnali Pawar
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to androidSwapnali Pawar
 
Android Introduction
Android IntroductionAndroid Introduction
Android IntroductionSwapnali Pawar
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Swapnali Pawar
 
Exception Handling
Exception Handling Exception Handling
Exception Handling Swapnali Pawar
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3Swapnali Pawar
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting LabSwapnali Pawar
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile TechnologySwapnali Pawar
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1Swapnali Pawar
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2Swapnali Pawar
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scriptingSwapnali Pawar
 

More from Swapnali Pawar (17)

Unit 3 introduction to android
Unit 3 introduction to android Unit 3 introduction to android
Unit 3 introduction to android
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Introduction to ios
Introduction to iosIntroduction to ios
Introduction to ios
 
Fresher interview tips demo
Fresher interview tips demoFresher interview tips demo
Fresher interview tips demo
 
View & index in SQL
View & index in SQLView & index in SQL
View & index in SQL
 
Introduction to android
Introduction to androidIntroduction to android
Introduction to android
 
Android Introduction
Android IntroductionAndroid Introduction
Android Introduction
 
SQL JOINS
SQL JOINSSQL JOINS
SQL JOINS
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Exception Handling
Exception Handling Exception Handling
Exception Handling
 
Mobile Technology 3
Mobile Technology 3Mobile Technology 3
Mobile Technology 3
 
Web Programming& Scripting Lab
Web Programming& Scripting LabWeb Programming& Scripting Lab
Web Programming& Scripting Lab
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Database Management System 1
Database Management System 1Database Management System 1
Database Management System 1
 
web programming & scripting 2
web programming & scripting 2web programming & scripting 2
web programming & scripting 2
 
web programming & scripting
web programming & scriptingweb programming & scripting
web programming & scripting
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Unit 2.design computing architecture 2.1

  • 1. Mobile Technologies Unit 2.1 DESIGN MOBILE COMPUTING ARCHITECTURE Ms. Swapnali Pawar Swapnali Pawar
  • 2. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Index • Security Concerns Related to Mobile Computing • Guidelines for Mobile Computing Security • What is Middleware? • What is Gateway ? • Making Existing Application Mobile‐Enabled
  • 3. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Security Concerns Related to Mobile Computing • Confidentiality: This is used to prevent unauthorized users from gaining access to any particular user's critical and confidential information. • Integrity: This is used to ensure that any type of unauthorized modification, destruction or creation of information cannot be done. • Availability: The availability is used to ensure that authorized users get the required access whenever they need it. • Legitimate: This is used to ensure that only authorized, and legitimate users have access to the services. • Accountability: Accountability is used to ensure that the users will be responsible for their security-related activities by arranging the users and their activities in a linked form.
  • 4. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Security Concerns Related to Mobile Computing
  • 5. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 6. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Wireless Security Issues Denial of Service (DOS) attacks The denial of services or DOS attacks is one of the most common attacks of all kinds of networks and especially in a wireless network. It prevents users from using network services because the attacker sends a large amount of unnecessary data or connection requests to the communication server. It causes a slow network, and therefore the users cannot get benefitted from using its service. Traffic Analysis Traffic analysis is used to identify and monitor communication between users. In this process, the service provider listens the traffic flowing in the wireless channel to access the private information of users affected by the attacker. Eavesdropping It specifies that the attacker can log on to the wireless network and access sensitive data if the wireless network was not secure enough. This can also be done if the information is not encrypted.
  • 7. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Session Interception and Messages Modification It specifies that the attacker can intercept the session and modify the transmitted data in this session. This scenario is called "man in the middle." It inserts the attacker's host between the sender and receiver host. Spoofing In this security issue, the attacker impersonates him as an authorized account of another user and tries to access the sensitive data and unauthorized services. Captured and Retransmitted Messages In this security issue, the attacker can get some of the network services by getting unauthorized access. After capturing the message, he/she can reply to it with some modifications to the same destination Wireless Security Issues
  • 8. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 9. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Wireless Security
  • 10. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Device Security Issues • Push Attacks In the push attack, the attacker creates a malicious code at the user's mobile device by hacking it and then he/she may spread it to affect other elements of the network. • Pull Attacks The pull attack is a type of attack where the attacker controls the device and handles it in his/her way. He can decide which emails they want to receive. In this attack, the user can decide about the obtained data by the device itself. • Forced De-authentication In this security issue, the attackers convince the mobile end-point or the mobile user to drop its connection and re-connection to get a new signal. Within this process, they insert their device between the mobile device and the network and steal the information or do the fraud.
  • 11. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Device Security Issues • Multi-protocol Communication The multi-protocol communication provides the ability of many mobile devices to operate using multiple protocols. For example, A cellular provider's network protocol. Most of the protocols have some security loopholes, which help the attacker to exploit this weakness and access to the device. • Mobility This security issue may occur because of the mobility of the users and the mobile devices. You may face these security threats due to a user's location, so you must replicate the user profiles at different locations to allow roaming via different places without any concern regarding access to personal and sensitive data in any place and at any time. This repetition of sensitive data on different sites can increase seethe chances of security threats.
  • 12. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar • Disconnections These types of security issues occur when mobile devices go to different places. It occurs in the form of frequent disconnections caused by external parties resulting in the handoff. Device Security Issues
  • 13. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Personnel security issues or insider attacks How to handle security issues? The company should hire qualified personnel. You should install security hardware and software. You should ensure that the data stored in the mobile devices are encrypted and audited. Educate the users on proper mobile computing ethics and security issues. You must ensure that the mobile devices are configured with a power- on authentication to prevent unauthorized access if lost or stolen. You must ensure that anti-virus software is installed on mobile devices. Make sure that the firewall client is installed on mobile devices. Make your mobile devices encrypted with a strong password. Encrypt your data stored in the secondary storage devices such as Memory Sticks, Data card, removable USB etc. Ensure that the Bluetooth, Wi-Fi, etc. enabled mobile devices are turned off when you are not using them. Make periodic backups of your mobile devices on a data server.
  • 14. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Guidelines for Mobile Computing Security 1. Encryption: Mobile devices that do store sensitive data can be protected by means of encryption systems. Automatic encryption/decryption systems exist, but are less secure than systems which require the user to enter a password at the beginning of every session. Both Android and Apple iOS devices can be set up to utilize encryption capabilities. 2. External Identification: End users should label their mobile devices with their name and telephone contact information so lost devices can be returned to them, even after their battery has gone dead. 3. Limiting Data Storage: One of the best ways to prevent the compromise or loss of sensitive data is not to store it on a mobile device. Such data can be stored in the cloud or accessed from a proprietary server. Naturally, means of access must be thoroughly secured, or there is no advantage to be gained from keeping sensitive data off a mobile device.
  • 15. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 4. Lost Device Locator and Data Eraser Systems: Depending on the mobile device and its operating systems, there are various technologies that enable end users to locate a lost device (even if it's just between the couch cushions). Failing that, there are ways to remotely erase sensitive data. Encourage end users to enroll their devices in a good system, and to learn how to use it. 5. Passwords and Timeouts: End users should set a password and a relatively brief timer to shut down and lock their mobile devices when left idle for even a few minutes. Passwords and timeouts prevent—or at least delay— unauthorized users from gaining access to sensitive data not only on lost or stolen devices, but also on devices left unattended in homes and offices. 6. Trusted Sources: Mobile devices can add software from a variety of sources, but end users should rely only on trusted sources, such as the Apple iTunes Store, Google Play, or the Amazon App Store for Android. Other sources are less likely to thoroughly search for and prevent software contaminated by viruses or other malware. Guidelines for Mobile Computing Security
  • 16. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar What is Middleware? Middleware is Software that provides a link between separate software applications. It is a layer that lies between the operating system and applications.
  • 17. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Use of Middleware: • Provide interaction with another service or application. • Filter data to make them friendly usable. • Make an application independent from network services. • Make an application reliable and always available. • Add complementary attributes like semantics.
  • 18. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Types of Middleware 1. Communication Middleware : Communication Middleware is used to connect one application with another application. For Example connecting one application with another application using telnet. 2. Message Oriented Middleware: It supports the receiving and sending of messages over distributed applications. It enables applications to be disbursed over various platforms. It makes the process of creating software applications across many operating systems. It makes network protocols less complicated. It holds many advantages over middleware alternatives and is one of the most widely used types of middleware. 3. Object Oriented Middleware : Object Oriented Middleware is also known as an object request broker. It provides the facility to send objects and request services via an object oriented system. In short, it manages the communication between objects.
  • 19. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 4. Remote Procedure Call (RPC) Middleware : It provides the facility to calls procedures on remote systems and is used to perform synchronous or asynchronous interactions between applications or systems. It is usually utilized within a software application. 5. Database Middleware: It provides direct access to databases and direct interaction with databases, There are many database gateways and connectivity options and you simply have to see what will best work for your necessary solution. This is the most general and commonly known type of middleware. This includes SQL database software. 6. Transaction Middleware :This type of middleware includes applications like transaction processing monitors. It also encompasses web application servers, These types of middleware are becoming more and more common today. Types of Middleware
  • 20. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar 7. Embedded Middleware : This type of middleware allows the facility of communication and integration of services with an interface of software or firmware. It acts as a liaison between embedded applications and the real time operating system. 7. Content-Centric Middleware: This type of middleware allows you to abstract specific content without worry of how it is obtained. This is done through a simple provide / consume abstraction. It is similar to publish / subscribe middleware, which is another type of this software that is often used as a part of web based applications. Types of Middleware
  • 21. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Middleware
  • 22. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar What is Gateway ? Gateways are required when the networks between the device and the middleware having different set of protocol. For Example: an IVR (Interactive Voice Response) Gateway is used to interface voice with a computer. WAP Gateway is used to access internet on mobile phones
  • 23. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 24. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar
  • 25. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar Making Existing Application Mobile‐Enabled There are many applications that are now being used within the intranet or the corporate network. These application need to be made ubiquitous and mobile computing capable. There are many ways by which this can be achieved: • Enhance existing application take the current application. Enhance the application to support mobile computing. • Rent an application from an ASP, there are many organizations who develop ubiquitous application and rent the same at a fee. • Write a new application, develop a new application to meet the new business requirement of the mobile computing. • Buy a packaged solution, there are many companies who are offering packaged solutions for various business areas starting from manufacturing to sales and marketing. Buy and install one. • Bridge the gap through middleware, use different middleware techniques to facelift and mobile computing enable the existing application.
  • 26. MT Unit 2-Design Mobile Computing Architecture ~Swapnali Pawar