Mobile Security Threats: A Survey on Protection and Mitigation Strategies
نویسندگان
چکیده
منابع مشابه
Survey on Security Threats of Wireless & Mobile Adhoc Network
A mobile ad hoc network (MANET), is a self-configuring network of mobile devices connected by wireless links. The Ad hoc networks are a new wireless networking paradigm for mobile hosts. Wireless adhoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless adhoc environment is an important concern. In thi...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors
This manuscript surveys a variety of topics related to the security of connected vehicles and their associated services, often referred to as telematics. Current challenges as well as emerging and future security risks are discussed. A number of specific technologies and implementations are discussed, such as Next Generation Telematics Patterns, KeeLoq, vehicular ad hoc networks, and controller...
متن کاملGame Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches b...
متن کاملNetwork Security Threats and Protection Models
In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the pot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International conference KNOWLEDGE-BASED ORGANIZATION
سال: 2020
ISSN: 2451-3113,1843-6722
DOI: 10.2478/kbo-2020-0127