This website uses cookies to ensure you have the best experience. Learn more

A Hierarchical Frameworkmodel Of Mobile Security

3701 words - 15 pages

A Hierarchical FrameworkModel of Mobile Security

Abstract—As wireless communications and mobile
multimedia services are booming nowadays, systematic research
of the overall aspects of mobile security is crucial. This paper
presents a framework model for guiding the systematic
investigation of mobile security. Based on the introduction of
some background viewpoints of security targets from a novel
perspective, the framework is described as a hierarchical model
in which mobile security research is partitioned into three
different layers, including Property Theory, Limited Targets,
and Classified Applications. Key research topics in each layer
are discussed respectively in detail. ...view middle of the document...

The phenomenal growth in mobile and wireless
communications entails the serious problem of security. The
causes, mainly due to the frangibility of wireless and mobile
features and the variety of applications and services, fall into
the following categories:
· The physical weaknesses and limitations of mobile
and wireless communications, e.g. high error rate and
unpredictable error behaviour due to external
interference and mobility, introduce influences on
characteristics of not only performance, but also
security.
· The entirely exposed environment of wireless air radio
and field devices provides much more opportunities of
being subject to malicious attacks and/or being
susceptible to accidental interferences.
· Applications are becoming more and more important
than ever, including mobile applications and services
in areas of military, health care, business, finance, etc.
· Other services may bring users easily in contact with
possible threats of intruding privacy, e.g. locationawareness
services and context-based applications.
· Contents of provided services, most of which are
multimedia-type, are valuable not only to subscribers
but also to composers and providers, and thus secure
protective measures are needed.
Obviously the simple migration of methods used in wired
communications in order to obtain security into a mobile
scenario cannot satisfy the requirements of anyone besides
hackers. Many studies have focused mainly on mobile
subscriber authentication, radio-path encryption [2-4], and
secure mobile IP [5, 6], but so-called “mobile security” by no
means involves only these relative independent and narrow
domains. We indeed need a more systematic approach to gear
up the research on mobile security.
In this paper, we present a framework for the systematic
research of mobile security. The framework is figured as a
hierarchical model in which the research of mobile security is
divided into three different layers: Property Theory, Limited
Targets, and Classified Applications. Key research topics in
each layer are discussed respectively in detail.
This paper is structured as follows. In Section II, some
background information related to the framework
construction of mobile security is introduced. The description
of mobile security framework is presented in Section III.
Section IV mainly discusses the key research issues in each
of the three layers composing the framework. Finally, we
summarize the paper by conclusions in Section V.
II. BACKGROUND OF SECURITY TARGETS
Regarding the term of mobile security, it is really a
straightforward perspective to position its targets only on
mobile and wireless networks and communications. The fact
is, however, that research on networks is neither the only
concern nor even the most important one. It is a
misunderstanding to think that concentrating the whole
attention on OSI reference model is an easy and efficient
approach whenever networks are...

Other Papers Like A Hierarchical Frameworkmodel of Mobile Security

Beth A Grillo - It540 Management Of Information Security - Assignment - Unit 2

297 words - 2 pages Unit 2 Assignment: Security Policy Implementation Beth A. Grillo, MHA, CPC-A July 19th, 2016 IT540-01: Management of Information Security Dr. Kenneth Flick Kaplan University Table of Contents Unit Two Assignment: Security Policy Implementation 3 Part 1: Step 29 3 Part 1: Step 36 3 Part 3: Step 33 4 Part 3: Significance of Strict Password Policy 5 Reference 6 Unit Two Assignment: Security Policy Implementation Part 1

Cold War Canada: A Time Of Collective Security And Political Urging

1192 words - 5 pages world with the security which they require..." (291-292). As it stood, the organization's crude physical protection scheme, comprised of a undeveloped "unpaid assistant militia", would not be able to defend its members in the event of a devastating Communist attack.With that one trial of an atomic bomb, the arms race had started. With a twisted ideology that was, "[the] basic reason why Russia has not attacked [the Allies] is that we can outproduce

JSB Market Research - Middle East - Mobile Voice and Mobile Operators Market

5363 words - 22 pages implemented, multi-SIM ownership was further exacerbated by the lack of MNP. Both operators have deployed sophisticated HSPA+ and LTE networks. Yemen’s mobile networks were shut down a number of times due to war or security problems until being reconnected in early 1998. The market is served by three GSM and one CDMA operator. Current penetration levels indicate there is much room for growth, with prepaid services accounting for the

Arm Framwork

404 words - 2 pages crime these kind of social crime not understand as a crime and this is the time to think and to do something about this. * Social crime is a too much type knows a day’s mostly social crime held with the help of mobile phone. Cyber Bulling * Mobile phone makes a reason of anxiety and behind it many reason are involved. For example a call from unknown number makes a reason of anxiety. Some time a call from stranger which threat you make a

Mgmt T Information System Review

602 words - 3 pages attractive compared to 802.11i because many older devices can be upgraded to wpa. Access points take packets from wireless devices and send them on to devices on the wired lan. They also do the opposite . Wlan users are mobile so wlans use omnidirectional antennas. Speed spectrum transmission is used in wlans for security reasons. False. An unauthorized internal access point is a rogue access point. If an 802.11a wlan has a throughput of 23 mbps

Global Mobile Payment Market - Analysis, Applications, Trends, Opportunities, Growth and Forecast, 2014 - 2020

574 words - 3 pages data storage requirement at an economical cost - For a full, detailed list, view our report. Market Challenges - Concerns of data security To view a full Executive Summary and Table of Contents, please visit: https://www.bharatbook.com/financial-service-market-research-reports-552076/global-mobile-payment-market.html Related Reports : https://www.bharatbook.com/service-industry-market-research-report/financial-service.html About

Obstacles to Implementation of Mobile Payment

1212 words - 5 pages retraining staff. Mobile stakeholders must work harder to identify a compelling need for merchants to accept contactless payments. 4. Security of mobile payment Following the recent data breaches news from Sony, consumer awareness of security risks has increased very greatly. The technology that supports mobile payments will soon become widely available as several major smartphone operating systems have announced support for NFC. However

Administative Ethics Paper

1126 words - 5 pages this record if the mobile device is lost or stolen. “The most common form of security breach is the theft of mobile devices” (Barrett, 2011). The reason behind this is because their small in size and portable. A survey concluded that because of lost or stolen mobile devices 66 percent of data breaches were done over the past two years. Another reason why the use of mobile devices sparks the HIPAA Security Rule is because it does not restrict

Mobile Kaolin Crushing Plant

909 words - 4 pages Mobile Cone Crushing Plant is not limited to the locatiStone Crushers In Between Ajmer And Nagoreon of crushing operation, and it reduces the cost of material transportation. Mobile Crushing Plant - Manufacturers , Suppliers Mobile Impact Crushing Plant. Introduction: Star Trace crushers are a new design that produces an excellent cubical product. This impact crusher produces a high ratio Mobile Crusher,Mobile Crusher Plant,Mobile As a

Mobile Wallet Technology

750 words - 3 pages information! It is almost as if your device acts as a remote control to access your accounts. With more than 500 banks and credit unions utilizing mobile wallets and banking systems, it appears that the ever-evolving mobile wallet space is gaining success, with significance on convenience and security. “Debit cards and credit cards, which significantly reduced the need to carry “real” money around, still hold the disadvantage of theft or loss, which

Micro-Mobile Data Center Market Trending Report

569 words - 3 pages A micro-mobile data center is a small, portable data center system designed to resolve or share the workloads of the conventional data centers. Micro-mobile data centers come with small set of servers and virtual machines as compared to the traditional data centers. Micro-mobile data centersprovide secure and fast access to data and compute resources. These are even enhanced with in-built cooling systems, security systems, associated management

Related Essays

Encryption A Means Of Security Essay

4201 words - 17 pages Seminar Presentation On Application of encrypting techniques In Database Security By Uweh SKelvin ABSTRACT Security in today’s world is one of the important challenges that people are facing all over the world in every aspect of their lives. Similarly security in electronic world has a great significance. In this seminar work, we discuss the applications of encryption techniques in database security. This is an area of

A Look At Cost Of Capital Decisions At Exxon Mobile

895 words - 4 pages A Look at Cost of Capital Decisions at Exxon Mobile American Military University Abstract This paper discusses and analyses the cost of capital decisions Exxon Mobile faces after its acquisition of XTO Energy. The advantages and disadvantages of both single company – wide cost of capital and divisional costs of capital are detailed. Finally, the method of estimating the costs of capital and determining how Exxon Mobile could best evaluate

Preferences Of Mobile Network Customers A Case Study

9718 words - 39 pages PREFERENCES OF MOBILE NETWORK CUSTOMERS: - A CASE STUDY Project submitted to the Mahatma Gandhi University in partial fulfillment of the requirements for the award of the Degree of Bachelor of Arts in Economics Submitted by Jithin Thomas [Reg. No. SAAD10158223] Under the Supervision of Prof. Mr. Johnson K Joyce. MA, Assistant Professor Department of Economics, St. Berchmans College, Changanacheery DEPARTMENT OF ECONOMICS

A Study Of The Technological Environment Of Mobile Services Industry Of India

5269 words - 22 pages technology systems a new era in Mobile technology in India is about to be born. GSM (GLOBAL SYSTEM FOR MOBILE COMMUNICATION) GSM is a widely used Second Generation cellular telecom network .Since the technology is fully digital it enables Digital encryption, which provides a moderate security of Phone conversations, compression of data, and mobile data services (eg. SMS). Today, GSM holds a share of 82.4%, includes the 3GSM service, of