Survey on Security Systems for Mobile Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 147

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

21st century have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Security issues mobile device directly questions credibility of applications and services. Currently available network security mechanisms are inadequate, since there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism. Hence, mobile security is no longer inherent, but of vital importance. Security model that adapt to the various capabilities and security requirements of a mobile system is necessary. This analysis paper provides a brief overview of mobile network security.

Keywords: mobile network security, comprehensive, scalable, security requirements

Edition: Volume 2 Issue 1, January 2013

Pages: 298 - 301

Share this Article

How to Cite this Article?

Lokesh Giripunje, Sonali Nimbhorkar, "Survey on Security Systems for Mobile Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010199, Volume 2 Issue 1, January 2013, 298 - 301

Enter Your Email Address




Similar Articles with Keyword 'mobile network security'

Downloads: 118

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 1, January 2015

Pages: 1608 - 1617

Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Mustafa AL-Fayoumi, Mohammed Nababteh, Mohammad Sh. Daoud, Mohammad Alhawarat

Share this Article

Downloads: 147

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 298 - 301

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

Share this Article

Similar Articles with Keyword 'comprehensive'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 3 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Downloads: 51

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Downloads: 98

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1029 - 1031

Information Technology Implementation for Comprehensive Development of Rural India - A Review

Vaishnavi J. Deshpande, Dr. Rajeshkumar U. Sambhe

Share this Article

Similar Articles with Keyword 'scalable'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 5 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Downloads: 97

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Similar Articles with Keyword 'security requirements'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 997 - 1001

Secure and Privacy Preserving Navigation in VANET

Sudarshana A. Abbad, S. P. Godse

Share this Article

Downloads: 115

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1152 - 1154

A Survey on Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (CWSN)

Vijay Kukre, Shubhangi Vairagar

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 125 - 127

OI-Execute Analytics in Real Time

Shivani Grover, Parbhat Verma

Share this Article



Top