2010
DOI: 10.4236/wsn.2010.26054
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Review of Security Schemes in Mobile Computing

Abstract: In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and milit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 53 publications
0
4
0
1
Order By: Relevance
“…Cybersecurity‐related threats are an important issue 10‐29 . Similarly, there are several possible security attacks in IoV that can be classified based on security requirements: Authentication, Confidentiality, Integrity and Availability 30‐32 …”
Section: Security Threats In Iovmentioning
confidence: 99%
“…Cybersecurity‐related threats are an important issue 10‐29 . Similarly, there are several possible security attacks in IoV that can be classified based on security requirements: Authentication, Confidentiality, Integrity and Availability 30‐32 …”
Section: Security Threats In Iovmentioning
confidence: 99%
“…While WebAssembly provides a sandboxing mechanism for applications at runtime level, something more comprehensive is needed at the scale of full liquid applications, their adaptive configurations, and migration. Here, our plan is to seek inspiration from mobile agents [15]. However, to truly address this aspect in detail, more specific use cases need to be considered, whereas here we have focused on technological factors only.…”
Section: Way Forward To the Visionmentioning
confidence: 99%
“…Same to the one-degree indirect reputation, B, D and U represent the probability of trust, not trust, and uncertainty, respectively. 22…”
Section: Reputation Updatementioning
confidence: 99%