Demanding Requirement of Security for Wireless Mobile Devices: A Survey
نویسندگان
چکیده
منابع مشابه
SMS Security in Mobile Devices: A Survey
SMS Security in Mobile Devices: A Survey Muhammad Waseem Khan Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt Email: [email protected] -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------The Short Message Service (SMS) is one of the frequently used mobile services w...
متن کاملApplication Security for Mobile Devices
In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or una...
متن کاملSecurity in Mobile Wireless Sensor Networks - A Survey
Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In...
متن کاملA Tiered Security System for Mobile Devices
We have designed a tiered security system for mobile devices where each security tier holds userdefined security triggers and actions. It has a friendly interface that allows users to easily define and configure the different circumstances and actions they need according to context. The system can be set up and activated from any browser or directly on the mobile device itself. When the securit...
متن کاملA Survey of Wireless Security
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Applied Sciences, Engineering and Technology
سال: 2014
ISSN: 2040-7459,2040-7467
DOI: 10.19026/rjaset.8.1244