Smartphone Operating Systems
Smartphone Operating Systems
C. SYMBIAN
The Symbian OS was projected particularly for mobile devices with its little
memory footprint and takes low power. It is an open OS, enabling free
access to the third party developers to develop and install apps
independently from the device producers. A broad C++ API is furnished
which permits access to services such as calling and messaging, in addition
to basic OS functionality. The Symbian OS was planned so applications could
run for years without losing the user data. Also the OS has the capability of
being platform independent and platform independent [6, 7, 8, 9].
D. WINDOWS MOBILE
This platform is founded on Windows CE (WinCE). WinCE is a compact OS
specifically planned for pervasive computing devices. It is sharpened on
providing a uniform interface for applications on several hardware platforms
which stresses portability by providing the user with the Win32 API. The
hardware platforms include Tablets, Smartphones, and even onboard LEDs in
automobiles. The Windows Mobile OS was designed for flexibility and with
the programmer in mind. For that reason it was designed to support lots of
pre-emptive multitasking. It confirms a whopping 256 priority levels for
threads and up to 32 processes. It supports all of the standard mutual
exclusion and synchronization methods you would expect from a desktop
PC. This practicality makes it ideal for a Smartphone because the users
generally demand multitasking and want to be as fertile as possible [4, 7, 8,
9]. E. Palm OS Palm OS is a proprietary operating system in the first place
developed by Palm Inc. In the early versions (pre-Garnet), the Palm OS was
primarily utilized in Palm-developed Personal Digital Assistant (PDA) mobile
hardware units. At one point, Palm PDAs with the Palm OS held 85% of the
market share in the mobile device market [12]. However, in recent years,
Palm's market share has been in decline, mostly due to the dead nature of
the OS development and has conceded the contributing position to Symbian
[6, 7, 8, 12].
II. LIMITATIONS OF MOBILE OS
As discussed in the previous sections, the mobile operating systems are
competing for the major market share and are claiming to be the best for
the users, yet they have number of limitations in their platforms which
for obvious reasons they are not disclosing to their users. The malicious
apps directed at mobile devices have mounted from about 14,000 to
40,000 in less than a year. This rise in the malicious apps requires a
secure OS. The securityrelated limitations of the Mobile operating
systems are listed below:
All or No Permission: A user cannot grant single permissions, while
rejecting others in order to install the app. Among the list of permissions
an app might request a set of suspicious permissions among the other
legitimate permissions, will still be able to confirm the installation.
Mobile devices may download malware which the mobile OS is not able
to trace. The novice users may download apps that contain malware
unknowingly because it can be disguised as a popular game, security
patch released by the OS, utility service, or other useful application. It is
difficult for novice users to make any difference between a legitimate
app and one containing the security risk in the form of malware.
Often, the users of the app cannot judge the appropriateness and
legitimacy of permissions for the app they are installing. In some other
cases it may be well understood, for example when a popular game app
requests the privilege to access the contacts or to send SMS messages.
In many cases, however, users will simply not be able to understand the
appropriateness of the permission.
Functionality, which is supposed to be possible only given the number of
permissions, can still be performed with less number of appropriate
permissions or even with none at all. In case of the iOS, the user is not at
all informed about any of the permissions. The app can access any of the
resources without the permission of the user.
TABLE II. RESISTANCE OF ANDROID AND IOS AGAINST VARIOUS ATTACKS
[5].