Recent Emerging Security Threats and Countermeasure Concepts in Mobile User Authentication
نویسندگان
چکیده
Over the past decades, mobile security threats have continued to change according to the mobile environment, which includes technical support such as mobile device specifications and network infrastructure. The current focus on security threats has not been on program defects in mobile devices but on errors made by human users (i.e., human or user errors). To prevent the damage from emerging threats, researchers have continued to propose alternative solutions. In this paper, we introduce several existing solutions corresponding to recent emerging security threats and briefly discuss the revealed problems and countermeasures.
منابع مشابه
Threats and Countermeasures in GSM Networks
Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of service (DOS) attacks will evolve into a critical danger as the availability of mobile networks becomes more and more important for the modern information society. This paper outlines a critical flaw in GSM networks which open...
متن کاملSecurity threats in Prepaid Mobile
Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communicatio...
متن کاملRisk Assessment of a Biometric Continuous Authentication Protocol for Internet Services
Distributed internet services involve multiple heterogeneous applications that communicate with each other. Guaranteeing their security is in general both mandatory and complex. Amongst the many security requirements that have to be guaranteed, secure user authentication is one of the most fundamental. Authentication is traditionally executed only at login phase, based on username and password....
متن کاملTowards a Mobile Security & Privacy Simulator
The proliferation and capabilities of mobile, networked devices is increasing rapidly and with this trend new threats to security and privacy are emerging at an alarming rate. The new threats are difficult to study and prepare for, since field studies are costly, limited in scope and have significant security and privacy issues of their own. In this paper, we present a Mobile Security & Privacy...
متن کاملA Methodology for UICC- Based Security Services in Pervasive Fixed Mobile Convergence Systems
Nowadays, Fixed Mobile Convergence (FMC) is an emerging worldwide trend in the form of fixed and mobile telephony convergence. In this pervasive environment, security should be considered to be a more important factor than before because the security threats of heterogeneous infrastructures can happen simultaneously. Thus, UICC, the ideal and secure medium embedded on the mobile terminals, has ...
متن کامل