Author:
Dahiya Ruby,Kashyap Anjali,Sharma Bhupendra,Sharma Rahul Kumar,Agarwal Nidhi
Abstract
INTRODUCTION: Mobile devices are integrated into daily activities of people's life. Compared to desktop computers the growth of mobile devices is tremendous in recent years. The growth of mobile devices opens vast scope for attackers on these devices.OBJECTIVES: This paper presents a deep study of different types of security risks involved in mobile devices and mobile applications. METHODS: In this paper we study various mechanisms of security risks for the mobile devices and their applications. We also study how to prevent these security risks in mobile devices.RESULTS: Various solutions are provided in paper through which operators can protect the security and privacy of user data and keep their customers' trust by implementing these procedures.CONCLUSION: This paper concludes with their solutions for providing a secure mobile network. This paper is structured as follows. Section 2 contains related work. Section 3 describes security problems. Section 4 discusses defensive methods and Section 5 gives the conclusion.
Publisher
European Alliance for Innovation n.o.
Subject
General Chemical Engineering
Reference18 articles.
1. Khan, J., Abbas, H., & Al-Muhtadi, J. (2015). Survey on Mobile User's Data Privacy Threats and Defense Mechanisms. Procedia Computer Science, 56, 376- 383.
2. Shukla, V., Chaturvedi, A., & Srivastava, N. (2015). A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography. Communication on applied electronics (CAE), 3(3), 16-21
3. Cifuentes, Y., Beltrán, L., & Ramírez, L. (2015, August). Analysis of Security Vulnerabilities for Mobile Health Applications. In 2015 Seventh International Conference on Mobile Computing and Networking (ICMCN 2015).
4. Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G., & Xenakis, C. (2016, May). Evaluation of Cryptography Usage in Android Applications. In proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, pp. 83-90.
5. Flauzac, O.; Nolot, F.; Rabat, C.; Steffenel, L.-A., "Grid of Security: A New Approach of the Network Security", In Proc. of Int. Conf. on Network and System Security, 2009. NSS '09, pp. 67-72, 2009.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel 3D Clustering Algorithm for Customer Segmentation;2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT);2024-02-09