Future Generation’ Mobile Protection and Security
M.A. Bari1 , I. Sultana2 , N. Fathima3 , S. Ahamad4
- Dept. of CSE & Vice-Principle, VIF College of Engineering & Technology, Hyderabad, India.
- Dept. of CSE, VIF College of Engineering & Technology, Hyderabad, India.
- Dept. of CS & SWE, College of Computer Science & Engineering, University of Hail, Saudi Arabia.
Correspondence should be addressed to: bari_bari11@rediffmail.com.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-1 , Page no. 298-303, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.298303
Online published on Jan 31, 2018
Copyright © M.A. Bari, I. Sultana, N. Fathima, S. Ahamad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M.A. Bari, I. Sultana, N. Fathima, S. Ahamad, “Future Generation’ Mobile Protection and Security,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.298-303, 2018.
MLA Style Citation: M.A. Bari, I. Sultana, N. Fathima, S. Ahamad "Future Generation’ Mobile Protection and Security." International Journal of Computer Sciences and Engineering 6.1 (2018): 298-303.
APA Style Citation: M.A. Bari, I. Sultana, N. Fathima, S. Ahamad, (2018). Future Generation’ Mobile Protection and Security. International Journal of Computer Sciences and Engineering, 6(1), 298-303.
BibTex Style Citation:
@article{Bari_2018,
author = {M.A. Bari, I. Sultana, N. Fathima, S. Ahamad},
title = {Future Generation’ Mobile Protection and Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {298-303},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1673},
doi = {https://doi.org/10.26438/ijcse/v6i1.298303}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.298303}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1673
TI - Future Generation’ Mobile Protection and Security
T2 - International Journal of Computer Sciences and Engineering
AU - M.A. Bari, I. Sultana, N. Fathima, S. Ahamad
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 298-303
IS - 1
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
618 | 547 downloads | 268 downloads |
Abstract
The future of mobile wireless communication networks will be experiencing several generations. This kind of development will drive the researches of information technology in industrial area of continuous development and evolution. In this paper, we have explored future generations of mobile wireless communication networks including 4th, 5th,and so forth. If looking to past, wireless access technologies have been followed different evolutionary paths with aim at unified target related to performance and efficiency in high mobile environment. Android develops one of the most popular mobile operating system in the whole world, as a side effect of this popularity, Android becomes the most preferred destination of hackers with different aims, some of them looking for making money and others are just having fun by raid the privacy of the others without their authorization. Nowadays, Android security has become a major problem because of the free application provided and functionalities that make it very easy for anyone to progress it. However, various systems have been planned by a large number of scholars to address these problems.
Key-Words / Index Term
3G, 4G, 5G, Phones, Android, Hacking
References
[1] Richard Goodwin “The History of mobile phones from 1973 to 2008: The Handsets That Made It ALL Happen “March 2017.
[2] Types.org.uk,” Types of Phones “,2016. http://types.org.uk/phones/types-of-phones/
[3] Afaq H. Khan, Mohammed A. Qadeer, Juned A. Ansari, Sariya Waheed,” 4G as a Next Generation Wireless Network “, International Conference on Future Computer and Communication ,2009.
[4] Wikipedia,” List of mobile phone generation “, November 2017
[5] Latifa Er-Rajy, My Ahmed El Kiram,” How far android is secure?”, IEEE,2015
[6] Wikipedia,” 5G”, November 2017. https://en.wikipedia.org/wiki/5G
[7] Daniel George,” 5G Wireless System “, St. Thomas College ,2014
[8] Pankaj Sharma,” Evolution of Mobile Wireless Communication Network -1G to 5G as well as Future Prospective of Next Generation Communication Network “, IJCSMC, Vol .2, Aug 2013.
[9] David Hall 1 ,” The Important of Bandwidth “, Electronic Design ,” 2015, http://www.electronicdesign.com/test-measurement/simple-transient-response-measurement-determines-power-supply-bandwidth
[10] Kumaravel, K. “Comparative Study of 3G and 4G in Mobile Technology. International Journal of Computer Science 8(5): 256-263. [20] “5G Mobile Phone Technology” ,2011, www.pediain.com
[11] Gupta, P. and Patil P. 4G- a new era in wireless telecommunication. Magister Program in S/W Engineering, Malardalen University.
[12] Williams, C., Strusani, D, Vincent, D. and Kovo, D. The Economic Impact of Next-Generation Mobile Services: How 3G Connections and the Use of Mobile Data Impact GDP Growth. The Global Information Technology Report: 77-80 ,2013
[13] Tutorials point simple learning,” Android -Architecture “,2017. https://www.tutorialspoint.com/android/android_architecture.htm
[14] Webkit “BSD License “, Apple Inc ,2009
[15] Hacking Tips and Tricks,” Hidden secret codes of android smart phone” 2013
[16] http://rishinhr.blogspot.in/2013/07/android-hidden-secret-codes-of-android.html
[17] Darien Graham -Smith,” 12-ways to hack-proof your smartphone”, Theguardian,2017
[18] https://www.theguardian.com/technology/2017/mar/26/12-ways-to-hack-proof-your-smartphone-privacy-data-thieves
[19] Seed Guide,” What are 1G, 2G, 3G & 4G network?”, SpeedGuide.net ,2017
[20] Xichun Li, Rosli Sallah ,” The Future of Mobile Wireless Communication Networks”, International Conference on Communication Software and Networks ,2009.