Security Adaptation Components for Mobile Communication
نویسنده
چکیده
Mobile computing and communication develops into an important factor in business, but it is accompanied with new security threats. The main problem lies on the one hand in the heterogeneity, dynamics and scarcity of the resources and on the other hand in the additional information like user location. In this paper, we investigate some issues concerning security of mobile computing systems, which are new to consider and we show a basic characteristic of these security issues, adaptability. The conditions of the mobile environment like the user location or network bandwidth are changing, but traditional security mechanisms are very static. We propose a "Security Adaptation Component" (SAC) introduced at the “base station“ and the „mobile unit“, which serves the adaptation of security issues to the particular mobile communication environment.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملEnforcing Private Policy via Security-by-Contract
This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve comp...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملDatabase Security Meets Mobile Requirements
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...
متن کاملMultilateral security considerations for adaptive mobile applications
Adaptive mobile applications are supposed to play an important role in the future of mobile communication. Adaptation offers a convenient and resource-saving way of providing tailored functionality. But to make this technology a success, the security of all concerned parties must be addressed. This work presents a multilateral security examination in two stages. We first introduce a co-operatio...
متن کامل