About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
IoT 24(1):

Editorial

Security in Mobile Network: Issues, Challenges and Solutions

Download87 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eetiot.4542,
        author={Ruby Dahiya and Anjali Kashyap and Bhupendra Sharma and Rahul Kumar Sharma and Nidhi Agarwal},
        title={Security in Mobile Network: Issues, Challenges and Solutions},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={10},
        number={1},
        publisher={EAI},
        journal_a={IOT},
        year={2023},
        month={12},
        keywords={mobile attacks, mobile security, data privacy, mobile applications, malware attacks},
        doi={10.4108/eetiot.4542}
    }
    
  • Ruby Dahiya
    Anjali Kashyap
    Bhupendra Sharma
    Rahul Kumar Sharma
    Nidhi Agarwal
    Year: 2023
    Security in Mobile Network: Issues, Challenges and Solutions
    IOT
    EAI
    DOI: 10.4108/eetiot.4542
Ruby Dahiya1, Anjali Kashyap1, Bhupendra Sharma1, Rahul Kumar Sharma1, Nidhi Agarwal1,*
  • 1: Galgotias University
*Contact email: nidhiagarwal82@gmail.com

Abstract

INTRODUCTION: Mobile devices are integrated into daily activities of people's life. Compared to desktop computers the growth of mobile devices is tremendous in recent years. The growth of mobile devices opens vast scope for attackers on these devices. OBJECTIVES: This paper presents a deep study of different types of security risks involved in mobile devices and mobile applications.  METHODS: In this paper we study various mechanisms of security risks for the mobile devices and their applications. We also study how to prevent these security risks in mobile devices. RESULTS: Various solutions are provided in paper through which operators can protect the security and privacy of user data and keep their customers' trust by implementing these procedures. CONCLUSION: This paper concludes with their solutions for providing a secure mobile network. This paper is structured as follows. Section 2 contains related work. Section 3 describes security problems. Section 4 discusses defensive methods and Section 5 gives the conclusion.

Keywords
mobile attacks, mobile security, data privacy, mobile applications, malware attacks
Received
2023-09-20
Accepted
2023-11-25
Published
2023-12-06
Publisher
EAI
http://dx.doi.org/10.4108/eetiot.4542

Copyright © 2023 R. Dahiya et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL