Communications security

Mobile devices support multiple communication methods, which in turn sets high requirements for security. A mobile device with various connection methods is exposed to a large number of attackers.

If you are developing a networked application, consider the following scenarios and determine how to recover from them:

  • The end user may lose network connection at any time or may not be able to establish a connection at all.

  • A connection may pass over a public network, which may expose the data if it is not encrypted during transmission.

  • Peer-to-peer connections are vulnerable to man-in-the-middle attacks. To prevent this, use strong authentication and proper ciphering methods.

For more information about communication with a mobile device, see the Communications Framework Guide section.

The following aspects of communication security are covered in this section: