Security Adaptation Components for Mobile Communication

نویسنده

  • Astrid Lubinski
چکیده

Mobile computing and communication develops into an important factor in business, but it is accompanied with new security threats. The main problem lies on the one hand in the heterogeneity, dynamics and scarcity of the resources and on the other hand in the additional information like user location. In this paper, we investigate some issues concerning security of mobile computing systems, which are new to consider and we show a basic characteristic of these security issues, adaptability. The conditions of the mobile environment like the user location or network bandwidth are changing, but traditional security mechanisms are very static. We propose a "Security Adaptation Component" (SAC) introduced at the “base station“ and the „mobile unit“, which serves the adaptation of security issues to the particular mobile communication environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Enforcing Private Policy via Security-by-Contract

This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve comp...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Database Security Meets Mobile Requirements

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...

متن کامل

Multilateral security considerations for adaptive mobile applications

Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality. But to make this technology a success, the security of all concerned parties must be addressed. This work presents a multilateral security examination in two stages. We first introduce a co-operatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007