Security Analysis of Mobile Device-to-Device Network Applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network

Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Mobile Device Security

Smartphone becomes the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computer's functionality, such as processing, communication, data storage and etc. It also provides many computer's service, such as web browser, portable media player, video call, GPS, Wi-Fi and etc. This paper analyzes and compares the...

متن کامل

Device Middleware for Mobile Applications

Nowadays, mobile-device applications operate in a virtual sandbox that runs each application in a tightly constrained environment. The applications don’t share code and can’t communicate with each other. This environment offers more security by preventing users from downloading buggy, malicious, or virus-infected code, but it lacks the flexibility, changeability, and maintainability that mobile...

متن کامل

Analysis and Security measures of Malware in Mobile device

New mobile technologies are growing rapidly. Smart phones and iPhones has added new dimensions in the field of mobile technology. It is used not only for conversation but also to carry data. The various features of Smartphone are Wi-Fi, touch-screen, SMS, digital camera, games, various apps, GPS system, mobile browsing, multi-tasking, support for 3-party software along with the basic features o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2019

ISSN: 2327-4662,2372-2541

DOI: 10.1109/jiot.2018.2877174