SlideShare a Scribd company logo
1 of 4
Download to read offline
CRITICAL REVIEW: SECURITY ISSUES IN MOBILE
NETWORKS
Leung, A., Sheng, Y., Cruickshank, H. (2007) The security challenges for mobile ubiquitous
services. Information Security Technical Report 12(3) pp 162-171
Zdarsky, F., Robitzsch, S., Banchs, A. (2010) Security analysis of wireless mesh backhauls for mobile
networks. Journal of network and computer applications. pp 1-11
INTRODUCTION
Security issues in mobile networks is bleeding and have rampaged every sector of life,
starting from homes extending into businesses, internets, banks and even into the mobile
network world. It is discovered that as technology advances so also theft and hacking increases
geometrically. There are so many cases of data loss, stolen credit cards, bank frauds, spam
messages, hacking, and virus attacks due to porous security platforms developed. These
challenges occur at the user's ends, on the core networks and at the providers end. It is
observed that enterprise users now use mobile devices to execute functions which are
previously performed from their desktops making the network to be more complex. In order to
effectively protect business and non business assets, measures has to be implemented and
adopted considering the fact that it must not affect quality and efficient delivery of services to
users on the network. Therefore the above has generated an urgent need to focus on providing
more comprehensive security solutions especially in mobile networks because they are more
vulnerable to attacks and threats. This paper comparatively reviews threat analysis and
identifies the appropriate security measures and requirements and subsequently devised good
security solutions.
BODY
The methodology used in these two papers is different but they had the same result.
Zdarsky, F., Robitzsch, S., Banchs, A. (2010) evaluated the analysis for security threats which has
greatly helped to identify potential risks and attacks on mobile network. He further examined
the highest ranking of security threats, analyzing where there could be major threats on the
network. He made his analysis by comparing the impact of a threat placing it side by side with
the likelihood of the threat so as to know the level of the risk under wireless mesh and
management links especially when there is physical attack or when faults are exploited during
threat implementation of the network. On the other hand Leung, A., Sheng, Y., Cruickshank, H.
(2007) examined threat analysis using a different approach and method by using a pictorial
diagram of a man called Jose who was moving from one end to another and still doing all of his
activities in a wireless environment e.g. from watching TV to using mobile phone, and
contacting service provider, taking a train using his laptop getting to the café and so on.
Emphasizing that as Mr. Jose moves from one node to the other which makes him open to
threat which could be from the user, provider or the network. From the stated analysis these
two authors identifies the various security threat on the networks as threat to user, threat to
providers, and as threat to data transport, threat to network mesh and management control.
These various threats are critically looked into and narrowed down as spoofing, framing,
malware, active and passive threats.
Based on the threat analysis discussed above the two papers agree on the basic
requirements for proficient security solution e.g. they mentioned providing confidentiality,
integrity, authenticity, non repudiation, availability, and privacy. Confidentiality is the assurance
that information or data is confined only to the authorized users on the network. Integrity is the
case when data is complete and sufficiently perfect and accurate for its purpose. While
authenticity establishes that information is genuine and has not been tampered with or forged,
a typical example when violated is masquerading. Authentication process is in the three forms
namely identification, verification and authentication which are the resources of a network. The
non repudiation basically gives protection against false involvement in an action.
Availability is also stressed as making that accessible when ever they are needed. The use of
network access control must be deployed to make sure the unauthorized users are not allowed
to access the network while the authorized users are granted the access.
Furthermore, Leung, A. et. al. (2007) examined security threats from three dimensions
e.g. user, network and service provider. He highlighted the various ways by which a user can be
subjected to security threats e.g. spoofing, information disclosure, profiling, framing, malware,
information overloading, configuration complexity, security parameters. He mentioned a key
point of how a network could be opened to security threats e.g. passive and active threats.
Passive threat is a threat where a party that is unauthorized gains access to data and he does
not change its content i.e. eavesdropping and traffic analysis while active threat is when
attackers make changes to data, messages modifications, denial of services. However the
approach of Zdarsky, F. et. al. (2010) identifies security threat in three ways, under
management and control, data transport, network entities. He emphasized passive and active
traffic analysis; he said security threat can emerge as a result of faulty softwares thereby
creating avenues for network attackers. He also mentioned that the attackers could have
classical software having sophisticated conglomerate.
In order to provide lasting security solutions to the aforementioned security threats
Leung, A. et. al. (2007) emphasized on two main clues which are by developing trusted
computing and integration of IPSec with AAA (Authentication, Authority and Account) and
hierarchical mobile IPv6 on the mobile network. Trusted computing is achieved by
incorporating a trusted hardware functionality that would provide a trusted platform module.
IPSec is fundamentally secures information traffics on the core network while AAA is used to
authenticate mobile signal nodes. IPSec is a layer protocol that ensures via sending and
receiving of cryptographically data packets with modifications. In the other paper "Zdarsky, F.
et. al. (2010)" he stressed the need to avoid a state without authorization, control signaling,
and also to avoid single points of failure.
CONCLUSION
The two papers have clearly and fully established security threats and were able to
streamline it down to mobile networks using different methodology emphasizing that they are
more vulnerable to security attacks on the ad hoc network. They both highlighted the various
security challenges and issues under mobile network in a diverse form and subsequently
provided possible solutions to avert mobile networks breakdown as a result of security threats
and attacks. Most importantly Leung, A. et. al. (2007) was able to deliver a descriptive
methodology. He gave a strong and deep technical analysis of security threat and he provided
concrete technical solutions which could give a long lasting solution to security attacks and also
left some open issues on security threats while Zdarsky, F. et. al. (2010) was just writing on the
surface although he dwelled too much in analyzing security threats but he did not provide a
silver bullet answer to security solutions which is a key under this topic. However the two
papers are recommendable, personally I will look at Leung, A. et. al. (2007) as an experienced
expatriate in security issues especially in mobile networks while Zdarsky, F. et. al. (2010) could
be a senior apprentice in mobile network security matters judging by the content of their
respective papers.

More Related Content

What's hot

OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSMaurice Dawson
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks1crore projects
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity IntroMark Stockman
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialogiosrjce
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 

What's hot (20)

OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
C018131821
C018131821C018131821
C018131821
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 

Similar to CRIT REV MOBILE NETWORK SECURITY ISSUES

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Vulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. docVulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. docNuhuHamza
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkIJNSA Journal
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkIJNSA Journal
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docxAASTHA76
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...ijtsrd
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdfArlene Smith
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxjeanettehully
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksPvrtechnologies Nellore
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismIJECEIAES
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT GroupCXT Group
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 

Similar to CRIT REV MOBILE NETWORK SECURITY ISSUES (20)

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Vulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. docVulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. doc
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Recently uploaded

83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...dollysharma2066
 
Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfkigaya33
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncrdollysharma2066
 
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426jennyeacort
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756dollysharma2066
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfNoel Sergeant
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》rnrncn29
 
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...bluetroyvictorVinay
 
labradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdflabradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdfAkrati jewels inc
 
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)beyonistskincare
 
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000Sapana Sha
 
'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trendsTangledThoughtsCO
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar HealthywayAmit Kakkar Healthyway
 

Recently uploaded (16)

83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
 
Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdf
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
 
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in New Friends Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdf
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
 
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...
Traditional vs. Modern Parenting: Unveiling the Pros and Cons for Your Child’...
 
Stunning ➥8448380779▻ Call Girls In Jasola Vihar Delhi NCR
Stunning ➥8448380779▻ Call Girls In Jasola Vihar Delhi NCRStunning ➥8448380779▻ Call Girls In Jasola Vihar Delhi NCR
Stunning ➥8448380779▻ Call Girls In Jasola Vihar Delhi NCR
 
labradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdflabradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdf
 
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)
Unlocking Radiant Skin: The Ultimate Skincare Guide( beyonist)
 
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000
Call Girls in Tughlakabad Delhi 9654467111 Shot 2000 Night 7000
 
'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
 

CRIT REV MOBILE NETWORK SECURITY ISSUES

  • 1. CRITICAL REVIEW: SECURITY ISSUES IN MOBILE NETWORKS Leung, A., Sheng, Y., Cruickshank, H. (2007) The security challenges for mobile ubiquitous services. Information Security Technical Report 12(3) pp 162-171 Zdarsky, F., Robitzsch, S., Banchs, A. (2010) Security analysis of wireless mesh backhauls for mobile networks. Journal of network and computer applications. pp 1-11 INTRODUCTION Security issues in mobile networks is bleeding and have rampaged every sector of life, starting from homes extending into businesses, internets, banks and even into the mobile network world. It is discovered that as technology advances so also theft and hacking increases geometrically. There are so many cases of data loss, stolen credit cards, bank frauds, spam messages, hacking, and virus attacks due to porous security platforms developed. These challenges occur at the user's ends, on the core networks and at the providers end. It is observed that enterprise users now use mobile devices to execute functions which are previously performed from their desktops making the network to be more complex. In order to effectively protect business and non business assets, measures has to be implemented and adopted considering the fact that it must not affect quality and efficient delivery of services to users on the network. Therefore the above has generated an urgent need to focus on providing more comprehensive security solutions especially in mobile networks because they are more vulnerable to attacks and threats. This paper comparatively reviews threat analysis and identifies the appropriate security measures and requirements and subsequently devised good security solutions.
  • 2. BODY The methodology used in these two papers is different but they had the same result. Zdarsky, F., Robitzsch, S., Banchs, A. (2010) evaluated the analysis for security threats which has greatly helped to identify potential risks and attacks on mobile network. He further examined the highest ranking of security threats, analyzing where there could be major threats on the network. He made his analysis by comparing the impact of a threat placing it side by side with the likelihood of the threat so as to know the level of the risk under wireless mesh and management links especially when there is physical attack or when faults are exploited during threat implementation of the network. On the other hand Leung, A., Sheng, Y., Cruickshank, H. (2007) examined threat analysis using a different approach and method by using a pictorial diagram of a man called Jose who was moving from one end to another and still doing all of his activities in a wireless environment e.g. from watching TV to using mobile phone, and contacting service provider, taking a train using his laptop getting to the café and so on. Emphasizing that as Mr. Jose moves from one node to the other which makes him open to threat which could be from the user, provider or the network. From the stated analysis these two authors identifies the various security threat on the networks as threat to user, threat to providers, and as threat to data transport, threat to network mesh and management control. These various threats are critically looked into and narrowed down as spoofing, framing, malware, active and passive threats. Based on the threat analysis discussed above the two papers agree on the basic requirements for proficient security solution e.g. they mentioned providing confidentiality, integrity, authenticity, non repudiation, availability, and privacy. Confidentiality is the assurance that information or data is confined only to the authorized users on the network. Integrity is the case when data is complete and sufficiently perfect and accurate for its purpose. While authenticity establishes that information is genuine and has not been tampered with or forged, a typical example when violated is masquerading. Authentication process is in the three forms namely identification, verification and authentication which are the resources of a network. The non repudiation basically gives protection against false involvement in an action.
  • 3. Availability is also stressed as making that accessible when ever they are needed. The use of network access control must be deployed to make sure the unauthorized users are not allowed to access the network while the authorized users are granted the access. Furthermore, Leung, A. et. al. (2007) examined security threats from three dimensions e.g. user, network and service provider. He highlighted the various ways by which a user can be subjected to security threats e.g. spoofing, information disclosure, profiling, framing, malware, information overloading, configuration complexity, security parameters. He mentioned a key point of how a network could be opened to security threats e.g. passive and active threats. Passive threat is a threat where a party that is unauthorized gains access to data and he does not change its content i.e. eavesdropping and traffic analysis while active threat is when attackers make changes to data, messages modifications, denial of services. However the approach of Zdarsky, F. et. al. (2010) identifies security threat in three ways, under management and control, data transport, network entities. He emphasized passive and active traffic analysis; he said security threat can emerge as a result of faulty softwares thereby creating avenues for network attackers. He also mentioned that the attackers could have classical software having sophisticated conglomerate. In order to provide lasting security solutions to the aforementioned security threats Leung, A. et. al. (2007) emphasized on two main clues which are by developing trusted computing and integration of IPSec with AAA (Authentication, Authority and Account) and hierarchical mobile IPv6 on the mobile network. Trusted computing is achieved by incorporating a trusted hardware functionality that would provide a trusted platform module. IPSec is fundamentally secures information traffics on the core network while AAA is used to authenticate mobile signal nodes. IPSec is a layer protocol that ensures via sending and receiving of cryptographically data packets with modifications. In the other paper "Zdarsky, F. et. al. (2010)" he stressed the need to avoid a state without authorization, control signaling, and also to avoid single points of failure.
  • 4. CONCLUSION The two papers have clearly and fully established security threats and were able to streamline it down to mobile networks using different methodology emphasizing that they are more vulnerable to security attacks on the ad hoc network. They both highlighted the various security challenges and issues under mobile network in a diverse form and subsequently provided possible solutions to avert mobile networks breakdown as a result of security threats and attacks. Most importantly Leung, A. et. al. (2007) was able to deliver a descriptive methodology. He gave a strong and deep technical analysis of security threat and he provided concrete technical solutions which could give a long lasting solution to security attacks and also left some open issues on security threats while Zdarsky, F. et. al. (2010) was just writing on the surface although he dwelled too much in analyzing security threats but he did not provide a silver bullet answer to security solutions which is a key under this topic. However the two papers are recommendable, personally I will look at Leung, A. et. al. (2007) as an experienced expatriate in security issues especially in mobile networks while Zdarsky, F. et. al. (2010) could be a senior apprentice in mobile network security matters judging by the content of their respective papers.