A Security Architecture for Mobile Computing-Based IoT

  • Farina Mutia Swiss German University
  • Eugene Ario Suradilaga Swiss German University
  • Raymond Giovadius Swiss German University
Keywords: mobile computing, mobile computing-based IoT, Internet of Things, security architecture


The Internet of Things (IoT) is a complex technology with various applications that have become a vital part of our daily life. The number of connected devices and the Internet of Things continues to increase. In terms of bandwidth, service availability, security controls, cyberattacks, and privacy problems, transporting the huge data created by these IoT devices to the cloud offers concern and challenges comprising intermittent connection, service unavailability, data loss at rest, in use, and in motion, unhardened device and server, unpatched device and server, and exploitation vulnerabilities. Mobile computing (MC) is a strategic solution to tackle these difficulties by offering flexible data processing and storage to end users, increase security controls and with customized IoT devices for varied geographic locations. This paper provides a complete description of the components of the IoT architecture. After that, it elaborates on similar security threats and potential cyberattacks in the context of mobile computing-based IoT and suggests solutions. In conclusion, we provide a secure mobile computing architecture design for IoT applications.



Download data is not yet available.


E. Fazeldehkordi and T.-M. Grønli, “A Survey of Security Architectures for Edge Computing-Based IoT,” IoT, vol. 3, no. 3, Art. no. 3, Sep. 2022, doi: 10.3390/iot3030019.

M. Sarika, V. Kotak, and A. Durafe, “A Review Paper on Internet of Things(IoT) and its Applications,” p. 1623, Jun. 2019.

“Advantages of Mobile Computing | Enhance Grade Level High,” Jul. 20, 2020. https://elysiumpro.in/advantages-of-mobile-computing/ (accessed Nov. 06, 2022).

A. Riahi Sfar, Z. Chtourou, and Y. Challal, A systemic and cognitive vision for IoT security: A case study of military live simulation and security challenges. 2017, p. 105. doi: 10.1109/SM2C.2017.8071828.

A. El Hakim, Internet of Things (IoT) System Architecture and Technologies, White Paper. 2018. doi: 10.13140/RG.2.2.17046.19521.

M. Wazid, A. K. Das, S. Shetty, P. Gope, and J. Rodrigues, “Security in 5G-Enabled Internet of Things Communication: Issues, Challenges and Future Research Roadmap,” IEEE Access, vol. PP, pp. 1–1, Dec. 2020, doi: 10.1109/ACCESS.2020.3047895.

J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., vol. PP, pp. 1–1, Mar. 2017, doi: 10.1109/JIOT.2017.2683200.

R. Olanrewaju, B. Khan, A. Hashim, K. Sidek, Z. Khan, and H. Daniyal, “The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications,” J. Adv. Res. Appl. Sci. Eng. Technol., vol. 26, pp. 51–77, Mar. 2022, doi: 10.37934/araset.26.1.5177.

D. Singh, Developing an Architecture: Scalability, Mobility, Control, and Isolation on Future Internet Services. 2013. doi: 10.1109/ICACCI.2013.6637467.

J. Franklin, G. Howell, V. Sritapan, M. Souppaya, and K. Scarfone, “Guidelines for Managing the Security of Mobile Devices in the Enterprise,” National Institute of Standards and Technology, NIST Special Publication (SP) 800-124 Rev. 2 (Draft), Mar. 2020. doi: 10.6028/NIST.SP.800-124r2-draft.

F. Ganz, D. Puschmann, P. Barnaghi, and F. Carrez, “A Practical Evaluation of Information Processing and Abstraction Techniques for the Internet of Things,” IEEE Internet Things J., vol. 2, pp. 1–1, Aug. 2015, doi: 10.1109/JIOT.2015.2411227.

A. Kamilaris and A. Pitsillides, “Mobile Phone Computing and the Internet of Things: A Survey,” IEEE Internet Things J., vol. 3, pp. 1–1, Dec. 2016, doi: 10.1109/JIOT.2016.2600569.

P. Dalal, G. Aggarwal, and S. Tejasvee, “Internet of Things (IoT) in Healthcare System: IA3 (Idea, Architecture, Advantages and Applications).” Rochester, NY, Apr. 01, 2020. doi: 10.2139/ssrn.3566282.

M. Ogata, J. Franklin, J. Voas, V. Sritapan, and S. Quirolgico, “Vetting the Security of Mobile Applications,” National Institute of Standards and Technology, NIST Special Publication (SP) 800-163 Rev. 1, Apr. 2019. doi: 10.6028/NIST.SP.800-163r1.

A. Sameer, “Internet of Things (IoT) Security,” Sep. 13, 2020. doi: 10.1109/NTICT.2020.P20.

S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things (IoT): A Literature Review,” J. Comput. Commun., vol. 03, no. 05, pp. 164–173, 2015, doi: 10.4236/jcc.2015.35021.

S. Muthuswamy and P. Ganapathi, “IOT Security Challenges and Issues – An Overview,” Feb. 2016.

A. Sallow and H. Shaikha, “Mobile Cloud Computing: A Review,” Feb. 2019.

A. Yousefpour et al., “All One Needs to Know about Fog Computing and Related Edge Computing Paradigms,” J. Syst. Archit., vol. 98, Feb. 2019, doi: 10.1016/j.sysarc.2019.02.009.

M. J. McGrath and C. N. Scanaill, “Key Sensor Technology Components: Hardware and Software Overview,” in Sensor Technologies: Healthcare, Wellness, and Environmental Applications, M. J. McGrath and C. N. Scanaill, Eds., Berkeley, CA: Apress, 2013, pp. 51–77. doi: 10.1007/978-1-4302-6014-1_3.

P. Weichbroth and Ł. Łysik, “Mobile Security: Threats and Best Practices,” Mob. Inf. Syst., vol. 2020, p. e8828078, Dec. 2020, doi: 10.1155/2020/8828078.

M. Tripathi, J. Gajrani, and V. Jain, “Mobile Security: Attacks and Prevention - Security in Mobile Communication,” 2017, pp. 43–59. doi: 10.4018/978-1-5225-2342-0.ch003.

C. Forrest, “New MobileIron report details most common mobile threats and blacklisted apps,” TechRepublic, Aug. 02, 2016. https://www.techrepublic.com/article/new-mobileiron-report-details-most-common-mobile-threats-and-blacklisted-apps/ (accessed Nov. 06, 2022).

How to Cite
Mutia, F., Ario Suradilaga, E., & Giovadius, R. (2023). A Security Architecture for Mobile Computing-Based IoT. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 7(4), 782 - 790. https://doi.org/10.29207/resti.v7i4.4950
Information Technology Articles