Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security of Mobile Devices for Multimedia Applications

Security of Mobile Devices for Multimedia Applications
View Sample PDF
Author(s): Goran Pulkkis (Arcada University of Applied Sciences, Finland), Kaj J. Grahn (Arcada University of Applied Sciences, Finland), Jonny Karlsson (Arcada University of Applied Sciences, Finland)and Nhat Dai Tran (Arcada University of Applied Sciences, Finland)
Copyright: 2008
Pages: 49
Source title: Mobile Multimedia Communications: Concepts, Applications, and Challenges
Source Author(s)/Editor(s): Gour Karmakar (Monash University, Australia)and Laurence S. Dooley (Monash University, Australia)
DOI: 10.4018/978-1-59140-766-9.ch012


View Security of Mobile Devices for Multimedia Applications on the publisher's website for pricing and purchasing information.


This chapter surveys security of mobile computing devices with focus on multimedia applications. Mobile computing devices are handheld devices such as PDAs (personal digital assistants) and smartphones with smaller size, processing, storage, and memory capacity compared to PCs (personal computers). The portability and various wireless network connection interfaces of the handheld devices greatly increase the risks of loss and theft of the device, exposure of confidential data, as well as the opportunities for unauthorized device, network, and network service access. The initial part of the chapter concentrates on discussing these basic security issues. Security requirements for wired and mobile multimedia network applications are outlined and network protocols (SIP, SRTP) for secure multimedia streaming services are presented. Mobile device security can be based on IPSec VPN technology and secure mobility is especially important in videoconferencing. Current research on roaming security and testbeds for mobile multimedia are also presented. In an appendix, commercially available mobile security solutions, mostly for basic mobile security requirements, are listed.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom