Mobile devices support multiple communication methods, which in turn sets high requirements for security. A mobile device with various connection methods is exposed to a large number of attackers.
If you are developing a networked application, consider the following scenarios and determine how to recover from them:
The end user may lose network connection at any time or may not be able to establish a connection at all.
A connection may pass over a public network, which may expose the data if it is not encrypted during transmission.
Peer-to-peer connections are vulnerable to man-in-the-middle attacks. To prevent this, use strong authentication and proper ciphering methods.
For more information about communication with a mobile device, see the Communications Framework Guide section.
The following aspects of communication security are covered in this section: