Survey on Security Systems for Mobile Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

21st century have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Security issues mobile device directly questions credibility of applications and services. Currently available network security mechanisms are inadequate, since there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism. Hence, mobile security is no longer inherent, but of vital importance. Security model that adapt to the various capabilities and security requirements of a mobile system is necessary. This analysis paper provides a brief overview of mobile network security.

Keywords: mobile network security, comprehensive, scalable, security requirements

Edition: Volume 2 Issue 1, January 2013

Pages: 298 - 301

Share this Article

How to Cite this Article?

Lokesh Giripunje, Sonali Nimbhorkar, "Survey on Security Systems for Mobile Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010199, Volume 2 Issue 1, January 2013, 298 - 301

119 PDF Views | 94 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'mobile network security'

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 1, January 2015

Pages: 1608 - 1617

Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Mustafa AL-Fayoumi, Mohammed Nababteh, Mohammad Sh. Daoud, Mohammad Alhawarat

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 298 - 301

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

Share this Article

Similar Articles with Keyword 'comprehensive'

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 16 - 20

A Comprehensive Review on Intents, Intention Mining and Intention Classification

Saroj S. Date

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1194 - 1196

A Comprehensive Survey on Image Inpainting Techniques

Radha Shirodkar, Manisha Darak

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1623 - 1627

Weight-based Ontology Pruning using Analysis of Inference Engines for Semantic Web

Kavita D. Pandya, Chirag Pandya

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Similar Articles with Keyword 'scalable'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1164 - 1169

A Survey on Scalable Big Data Analytics Platform

Ravindra Phule, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2851 - 2857

Rotation and Scale Invariant Automated Logo Recognition System using Moment Invariants and Hough Transform

Souvik Ghosh, Ranjan Parekh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2214 - 2216

Privacy-Preserving Mining of Association Rules in Cloud

Vishal Ravindra Redekar, Dr. K.N.Honwadkar

Share this Article

Similar Articles with Keyword 'security requirements'

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1152 - 1154

A Survey on Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (CWSN)

Vijay Kukre, Shubhangi Vairagar

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 808 - 813

Design and Development of an Advanced Database System with Multitenant Architecture, Advanced Security Transparent Data Encryption & Data Redaction

Mohammed Waheeduddin Hussain, Prof. P. Premchand, Dr. G. Manoj Someswar

Share this Article
Top