Abstract
The rapid evolution of mobile computing has unlocked unprecedented opportunities across communication, finance, e-commerce, healthcare, and cloud-integrated services. However, the ubiquity of smartphones and mobile IoT devices has elevated the risk of cyberattacks, data breaches, identity theft, and unauthorised surveillance. Cryptographic protocols provide the foundational mechanisms for confidentiality, integrity, authentication, and non-repudiation in mobile environments. This paper presents a comprehensive study of cryptographic protocols tailored for secure mobile computing, analysing their design principles, operational characteristics, performance constraints, and applicability to modern architectures such as edge computing, 5G networks, and mobile cloud ecosystems. We examine symmetric and asymmetric algorithms, lightweight cryptography, secure key exchange mechanisms, blockchain-backed authentication, and privacy-enhancing protocols. Furthermore, we evaluate contemporary security threats—including man-in-the-middle attacks, device cloning, malware injection, and side-channel attacks—and present protocol-level countermeasures. The paper concludes with a discussion of research challenges and future directions, highlighting post-quantum cryptography, AI-enabled threat detection, zero-trust authentication, and multi-factor, context-aware security for next-generation mobile systems.