International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

21st century have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Security issues mobile device directly questions credibility of applications and services. Currently available network security mechanisms are inadequate, since there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism. Hence, mobile security is no longer inherent, but of vital importance. Security model that adapt to the various capabilities and security requirements of a mobile system is necessary. This analysis paper provides a brief overview of mobile network security.

Keywords: mobile network security, comprehensive, scalable, security requirements

Edition: Volume 2 Issue 1, January 2013

Pages: 298 - 301


How to Cite this Article?

Lokesh Giripunje, Sonali Nimbhorkar, "Survey on Security Systems for Mobile Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010199, Volume 2 Issue 1, January 2013, 298 - 301

43 PDF Views | 30 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'mobile network security'

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 1, January 2015

Pages: 1608 - 1617

Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Mustafa AL-Fayoumi, Mohammed Nababteh, Mohammad Sh. Daoud, Mohammad Alhawarat

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 298 - 301

Survey on Security Systems for Mobile Network

Lokesh Giripunje, Sonali Nimbhorkar

Share this article

Similar Articles with Keyword 'comprehensive'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1365 - 1367

A Survey on Detection of Fake Online Reviews

Dr. Sameena Banu, Asma Shaheen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2676 - 2680

Effective and Efficient XML Duplicate Detection Using Levenshtein Distance Algorithm

Shital Gaikwad, Nagaraju Bogiri

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1221 - 1225

Survey of PC Access for the Benefit of Autistic People Using Facial Emotions

J. Nevetha

Share this article

Similar Articles with Keyword 'scalable'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1006 - 1010

Attribute Based Image Search Re-Ranking

Snehal S Patil, Ajay Dani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this article

Similar Articles with Keyword 'security requirements'

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 372 - 374

A Review on Database Security

Tejashri R. Gaikwad, A. B. Raut

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1152 - 1154

A Survey on Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (CWSN)

Vijay Kukre, Shubhangi Vairagar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 501 - 505

Secure Distributed and Auditing Reliability for Deduplication

Soumya S. M., Sarvamangala D. R.

Share this article

Top