Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security of Mobile Devices for Multimedia Applications

Security of Mobile Devices for Multimedia Applications
View Sample PDF
Author(s): Goran Pulkkis (Arcada University of Applied Sciences, Finland), Kaj Grahn (Arcada Arcada University of Applied Sciences, Finland), Jonny Karlsson (Arcada Arcada University of Applied Sciences, Finland) and Nhat Dai Tran (Arcada University of Applied Sciences, Finland)
Copyright: 2008
Pages: 45
Source title: Multimedia Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Mahbubur Rahman Syed (Minnesota State University Mankato, USA)
DOI: 10.4018/978-1-59904-953-3.ch049


View Security of Mobile Devices for Multimedia Applications on the publisher's website for pricing and purchasing information.


This chapter surveys security of mobile computing devices with focus on multimedia applications. Mobile computing devices are handheld devices such as PDAs (personal digital assistants) and smartphones with smaller size, processing, storage, and memory capacity compared to PCs (personal computers). The portability and various wireless network connection interfaces of the handheld devices greatly increase the risks of loss and theft of the device, exposure of confidential data, as well as the opportunities for unauthorized device, network, and network service access. The initial part of the chapter concentrates on discussing these basic security issues. Security requirements for wired and mobile multimedia network applications are outlined and network protocols (SIP, SRTP) for secure multimedia streaming services are presented. Mobile device security can be based on IPSec VPN technology and secure mobility is especially important in videoconferencing. Current research on roaming security and testbeds for mobile multimedia are also presented. In an appendix, commercially available mobile security solutions, mostly for basic mobile security requirements, are listed.

Related Content

Kuki Singh. © 2022. 36 pages.
Hanshu Wang, Chenyang Zhang. © 2022. 23 pages.
Nkholedzeni Sidney Netshakhuma. © 2022. 21 pages.
Ileana Torres, Aubrey Statti, Kelly M. Torres. © 2022. 33 pages.
Margarida M. Pinheiro, Vanda Santos. © 2022. 28 pages.
María-Mercedes Rojas-de-Gracia, Ana Esteban, María J. Bentabol, María Dolores Rodríguez-Ruiz, Amparo Bentabol, Ana Paula Lopes, Filomena Soares, María M. Muñoz, Mariano Soler-Porta, Rocío Caña-Palma. © 2022. 23 pages.
Sergio Francisco Sargo Ferreira Lopes, Jorge Manuel de Azevedo Pereira Simões. © 2022. 23 pages.
Body Bottom