Authentication Service Security
Authentication Service Security
Authentication Service Security
There are two components of security in mobile computing – security of devices and security of
networks. A secure network ensures that only authenticated devices can be connected to the
network for obtaining the requested services. Some eminent kind of attacks to which mobile
devices are subjected to are: push attacks, pull attacks and crash attacks.
Authentication service security is important given the typical attacks on mobile devices through the
wireless networks: denial of service (DoS) attacks, traffic analysis, eavesdropping, man-in-the-
middle attacks and session hijacking. Security measures in this scenario come from Wireless
Application Protocols (WAPs), use of Virtual Private Networks (VPNs), Media Access Control
(MAC) address filtering and development in 802.xx standards.
The CPM (Cryptographic Provider Manager) provides encryption services to any application
allowing the encryption of only selected data or of all data and resources on the device.
LDAP Security for Handheld Computing Devices: LDAP is a software protocol for
enabling anyone to locate organizations, individuals and other resources such as files and
devices in a network, whether on the public Internet or on a corporate Intranet. In a network
a directory tells you where in the network the entity is located. LDAP is a lightweight version
of Directory Access Protocol (DAP). LDAP makes revoking permissions quick and easy so
unwanted systems on the network can be kicked out efficiently.
RAS Security for Mobile Devices: RAS (Remote Access Server) is an important
consideration for protecting the business-sensitive data that may reside on the employee’s
mobile devices. In addition to being vulnerable to unauthorized access on their own, mobile
devices also provide a route into the systems with which they connect. A personal firewall
on a pocket PC or smart phone device can be effective protective screen against threat
from port scanning and other attacks, for the users connecting through a direct internet or
RAS connection.
Networking API security for Mobile Computing Applications: With the advent of
electronic commerce and its further off-shoot into m-commerce, online payments are
becoming popular with payment gateways accessed remotely and possibly wirelessly.
Further, with the advent of web services and their use in mobile computing applications, the
API becomes an important consideration.