2016
DOI: 10.1109/access.2016.2601009
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Threats and Attacks on Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
47
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(55 citation statements)
references
References 116 publications
1
47
0
Order By: Relevance
“…It can cover all the bandwidth (Barrage Jamming) or just a part of it (Partial Band Jamming). Interference jamming uses colored signals which are not synchronized to target signal [23].…”
Section: Physical Layer Jammingmentioning
confidence: 99%
“…It can cover all the bandwidth (Barrage Jamming) or just a part of it (Partial Band Jamming). Interference jamming uses colored signals which are not synchronized to target signal [23].…”
Section: Physical Layer Jammingmentioning
confidence: 99%
“…This feature enables Android to be used anywhere and on any device. However, opensource software can be more vulnerable to malicious users and apps than closed proprietary platforms, and Android has accordingly suffered from various security threats in recent years, such as private data leaks [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…The major attacks these networks encountering are the sinkhole, rushing, Byzantine, black hole, wormhole, and Sybil. Attacks like spoofing, dropping of routing traffic, selective forwarding, resource consumption are also important to be mentioned here [6], [7], [8], [9], [10], [11]. Besides this, the safe use of wireless devices like mobiles and smart-phones has been well discussed in [13].…”
Section: Introductionmentioning
confidence: 99%