Demanding Requirement of Security for Wireless Mobile Devices: A Survey

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SMS Security in Mobile Devices: A Survey

SMS Security in Mobile Devices: A Survey Muhammad Waseem Khan Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt Email: [email protected] -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------The Short Message Service (SMS) is one of the frequently used mobile services w...

متن کامل

Application Security for Mobile Devices

In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or una...

متن کامل

Security in Mobile Wireless Sensor Networks - A Survey

Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In...

متن کامل

A Tiered Security System for Mobile Devices

We have designed a tiered security system for mobile devices where each security tier holds userdefined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the securit...

متن کامل

A Survey of Wireless Security

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Research Journal of Applied Sciences, Engineering and Technology

سال: 2014

ISSN: 2040-7459,2040-7467

DOI: 10.19026/rjaset.8.1244