A Survey on Android Mobile Based Application and its Security

Sybi Cynthia*, Mary Gladence**, Julia Punitha Malar Dhas***
* Department of Computer Application, Scott Christian College (Autonomous), Nagercoil, Tamil Nadu, India.
** Department of Computer Science & Engineering, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, India.
*** Department of Computer Science & Engineering, Karunya Institute of Technology and Sciences, Coimbatore, Tamil Nadu, India.
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jmt.9.1.18910


It is undeniable that the significance of mobile phones in our daily life and activities is endless. The reason for this is because the mobile phone is undergoing a huge transformation and is no longer the normal communication device of the past. It has become a huge concern for entities and industries alike due to the variety of incredible features and openings that mobile phones offer. This study sounds to explore the use of mobile phone services in educational settings, banking systems, irrigation facilities, women's safety, etc., and explore the nature of mobile use in today's society. This review talks about mobile phone applications and their challenges used by mobile internet users and various applications. Today, given the large number of mobile phones and users, the security of mobile applications is very important. Identifying these challenges will assist the industries to be ready for efficient mobile application development and enable them in the successful completion of mobile application development projects. It is recommended that practitioners would contribute more attention to the frequently mentioned challenges identified in academia and industry. In future, more empirical studies are needed to revise the existing studies with more diverse practitioners.


Mobile Applications, Android App, Security Issues, Security Measures.

How to Cite this Article?

Cynthia, S., Gladence, M., and Dhas, J. P. M. (2022). A Survey on Android Mobile Based Application and its Security. i-manager’s Journal on Mobile Applications & Technologies, 9(1), 20-27. https://doi.org/10.26634/jmt.9.1.18910


[1]. Adeniji, K. A., Surajudeen-Bakinde, N. T., Omitola, O. O., & Ajibade, A. (2021). Validation of android based mobile application for retrieving network signal level. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 296-304. https://doi.org/10.11591/ijeecs.v21.i1.pp296-304
[2]. Albasheer, M. O., & Bashier, E. B. (2013, August). Enhanced model for PKI certificate validation in the mobile banking. In 2013, International Conference on Computing, Electrical and Electronic Engineering (ICCEEE) (pp. 470-476). IEEE. https://doi.org/10.1109/ICCEEE.2013.6633984
[3]. Baharuddin, R., Singh, D., & Razali, R. (2013). Usability dimensions for mobile applications-a review. Research Journal of Applied Sciences, Engineering and Technology, 5(6), 2225-2231.
[4]. Blondel, V. D., Decuyper, A., & Krings, G. (2015). A survey of results on mobile phone datasets analysis. EPJ Data Science, 4(1), 10. https://doi.org/10.1140/epjds/s13688-015-0046-0
[5]. El-Sofany, H. F., El-Seoud, S. A., Alwadani, H. M., & Alwadani, A. E. (2014). Development of mobile educational services application to improve educational outcomes using android technology. International Journal of Interactive Mobile Technologies (iJIM), 8(2), 4-9. https://doi.org/10.3991/ijim.v8i2.3509
[6]. Emergency Response Support System. (n.d.). Retrieved from https://112.gov.in
[7]. Fatah, A. F. A., Mohamad, R., & Rahman, F. Y. A. (2021, April). Student attendance system using an android based mobile application. In 2021, IEEE 11th IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) (pp. 224-227). IEEE. https://doi.org/10.1109/ISCAIE51753.2021.9431771
[8]. García, L., Parra, L., Jimenez, J. M., Lloret, J., & Lorenz, P. (2020). IoT-based smart irrigation systems: An overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture. Sensors, 20(4), 1042. https://doi.org/10.3390/s20041042
[9]. Geneiatakis, D., Fovino, I. N., Kounelis, I., & Stirparo, P. (2015). A Permission verification approach for android mobile applications. Computers & Security, 49, 192-205.
[10]. Harrison, R., Flood, D., & Duce, D. (2013). Usability of mobile applications: literature review and rationale for a new usability model. Journal of Interaction Science, 1(1), 1-16. https://doi.org/10.1186/2194-0827-1-1
[11]. Holla, S., & Katti, M. M. (2012). Android based mobile application development and its security. International Journal of Computer Trends and Technology, 3(3), 486-490.
[12]. Hyperlink Info System. (n.d.). Retrieved from https://www.hyperlinkinfosystem.com/blog/the-importance-of-mobile-applications-in-everyday-life
[13]. Laverty, J. P., Wood, D. F., Kohun, F. G., & Turchek, J. (2011). Comparative analysis of mobile application development and security models. Issues in Information Systems, 12(1), 301-312.
[14]. Ma, L., Gu, L., & Wang, J. (2014). Research and development of mobile application for android platform. International Journal of Multimedia and Ubiquitous Engineering, 9(4), 187-198.
[15]. Mandapati, S., Pamidi, S., & Ambati, S. (2015). A mobile based women safety application (I Safe Apps). IOSR Journal of Computer Engineering (IOSR-JCE), 17(1), 29-34. https://doi.org/ 10.9790/0661-17112934
[16]. Market Research. (n.d.). Retrieved from http://www. marketresearch.com
[17]. Ministry of Women and Child Development. (2020). SoS Safety App for Women. Retrieved from https://pib. gov.in/PressReleasePage.aspx?PRID=1656247
[18]. Mobile Application Development. (2020). Retrieved from https://www.ibm.com/cloud/learn/mobile-application-development-explained
[19]. Mobile Internet & Apps. (n.d.). Retrieved from https://net-apps/#statistic1
[20]. Olatunji, K. A., Oguntimilehin, A., & Adeyemo, O. A. (2020). A Mobile Phone Controllable Smart Irrigation System. International Journal of Advanced Trends in Computer Science and Engineering, 9(1), 279-284.
[21]. Pavithra, D. S., & Srinath, M. S. (2014). GSM based automatic irrigation control system for efficient use of resources and crop planning by using an Android mobile. IOSR Journal of Mechanical and Civil Engineering (IOSRJMCE), 11(4), 49-55.
[22]. Pocatilu, P. (2011). Android applications security. Informatica Economica, 15(3), 163-171.
[23]. Sarhan, H., Hafez, A. A., Safwat, A., & Hegazy, A. A. (2015). Secure android-based mobile banking scheme. International Journal of Computer Applications, 118(12).
[24]. Sarrab, M., Elgamel, L., & Aldabbas, H. (2012). Mobile learning (m-learning) and educational environments. International Journal of Distributed and Parallel Systems, 3(4), 31.
[25]. Sharma, K., & More, A. (2016). Advance woman security system based on android. IJIRST–International Journal for Innovative Research in Science & Technology, 2(12), 2349-6010.
[26]. Sharma, K., & More, A. (2016). Advance woman security system based on android. International Journal for Innovative Research in Science & Technology, 2(12), 2349-6010.
[27]. Zhu, H., Xiong, H., Ge, Y., & Chen, E. (2014, August). Mobile app recommendations with security and privacy awareness. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 951-960).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.