SlideShare a Scribd company logo
1 of 4
Download to read offline
CRITICAL REVIEW: SECURITY ISSUES IN MOBILE
NETWORKS
Leung, A., Sheng, Y., Cruickshank, H. (2007) The security challenges for mobile ubiquitous
services. Information Security Technical Report 12(3) pp 162-171
Zdarsky, F., Robitzsch, S., Banchs, A. (2010) Security analysis of wireless mesh backhauls for mobile
networks. Journal of network and computer applications. pp 1-11
INTRODUCTION
Security issues in mobile networks is bleeding and have rampaged every sector of life,
starting from homes extending into businesses, internets, banks and even into the mobile
network world. It is discovered that as technology advances so also theft and hacking increases
geometrically. There are so many cases of data loss, stolen credit cards, bank frauds, spam
messages, hacking, and virus attacks due to porous security platforms developed. These
challenges occur at the user's ends, on the core networks and at the providers end. It is
observed that enterprise users now use mobile devices to execute functions which are
previously performed from their desktops making the network to be more complex. In order to
effectively protect business and non business assets, measures has to be implemented and
adopted considering the fact that it must not affect quality and efficient delivery of services to
users on the network. Therefore the above has generated an urgent need to focus on providing
more comprehensive security solutions especially in mobile networks because they are more
vulnerable to attacks and threats. This paper comparatively reviews threat analysis and
identifies the appropriate security measures and requirements and subsequently devised good
security solutions.
BODY
The methodology used in these two papers is different but they had the same result.
Zdarsky, F., Robitzsch, S., Banchs, A. (2010) evaluated the analysis for security threats which has
greatly helped to identify potential risks and attacks on mobile network. He further examined
the highest ranking of security threats, analyzing where there could be major threats on the
network. He made his analysis by comparing the impact of a threat placing it side by side with
the likelihood of the threat so as to know the level of the risk under wireless mesh and
management links especially when there is physical attack or when faults are exploited during
threat implementation of the network. On the other hand Leung, A., Sheng, Y., Cruickshank, H.
(2007) examined threat analysis using a different approach and method by using a pictorial
diagram of a man called Jose who was moving from one end to another and still doing all of his
activities in a wireless environment e.g. from watching TV to using mobile phone, and
contacting service provider, taking a train using his laptop getting to the café and so on.
Emphasizing that as Mr. Jose moves from one node to the other which makes him open to
threat which could be from the user, provider or the network. From the stated analysis these
two authors identifies the various security threat on the networks as threat to user, threat to
providers, and as threat to data transport, threat to network mesh and management control.
These various threats are critically looked into and narrowed down as spoofing, framing,
malware, active and passive threats.
Based on the threat analysis discussed above the two papers agree on the basic
requirements for proficient security solution e.g. they mentioned providing confidentiality,
integrity, authenticity, non repudiation, availability, and privacy. Confidentiality is the assurance
that information or data is confined only to the authorized users on the network. Integrity is the
case when data is complete and sufficiently perfect and accurate for its purpose. While
authenticity establishes that information is genuine and has not been tampered with or forged,
a typical example when violated is masquerading. Authentication process is in the three forms
namely identification, verification and authentication which are the resources of a network. The
non repudiation basically gives protection against false involvement in an action.
Availability is also stressed as making that accessible when ever they are needed. The use of
network access control must be deployed to make sure the unauthorized users are not allowed
to access the network while the authorized users are granted the access.
Furthermore, Leung, A. et. al. (2007) examined security threats from three dimensions
e.g. user, network and service provider. He highlighted the various ways by which a user can be
subjected to security threats e.g. spoofing, information disclosure, profiling, framing, malware,
information overloading, configuration complexity, security parameters. He mentioned a key
point of how a network could be opened to security threats e.g. passive and active threats.
Passive threat is a threat where a party that is unauthorized gains access to data and he does
not change its content i.e. eavesdropping and traffic analysis while active threat is when
attackers make changes to data, messages modifications, denial of services. However the
approach of Zdarsky, F. et. al. (2010) identifies security threat in three ways, under
management and control, data transport, network entities. He emphasized passive and active
traffic analysis; he said security threat can emerge as a result of faulty softwares thereby
creating avenues for network attackers. He also mentioned that the attackers could have
classical software having sophisticated conglomerate.
In order to provide lasting security solutions to the aforementioned security threats
Leung, A. et. al. (2007) emphasized on two main clues which are by developing trusted
computing and integration of IPSec with AAA (Authentication, Authority and Account) and
hierarchical mobile IPv6 on the mobile network. Trusted computing is achieved by
incorporating a trusted hardware functionality that would provide a trusted platform module.
IPSec is fundamentally secures information traffics on the core network while AAA is used to
authenticate mobile signal nodes. IPSec is a layer protocol that ensures via sending and
receiving of cryptographically data packets with modifications. In the other paper "Zdarsky, F.
et. al. (2010)" he stressed the need to avoid a state without authorization, control signaling,
and also to avoid single points of failure.
CONCLUSION
The two papers have clearly and fully established security threats and were able to
streamline it down to mobile networks using different methodology emphasizing that they are
more vulnerable to security attacks on the ad hoc network. They both highlighted the various
security challenges and issues under mobile network in a diverse form and subsequently
provided possible solutions to avert mobile networks breakdown as a result of security threats
and attacks. Most importantly Leung, A. et. al. (2007) was able to deliver a descriptive
methodology. He gave a strong and deep technical analysis of security threat and he provided
concrete technical solutions which could give a long lasting solution to security attacks and also
left some open issues on security threats while Zdarsky, F. et. al. (2010) was just writing on the
surface although he dwelled too much in analyzing security threats but he did not provide a
silver bullet answer to security solutions which is a key under this topic. However the two
papers are recommendable, personally I will look at Leung, A. et. al. (2007) as an experienced
expatriate in security issues especially in mobile networks while Zdarsky, F. et. al. (2010) could
be a senior apprentice in mobile network security matters judging by the content of their
respective papers.

More Related Content

What's hot

Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
Government
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
IJMER
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks
1crore projects
 

What's hot (20)

OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
C018131821
C018131821C018131821
C018131821
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Alloy Cybersecurity Intro
Alloy Cybersecurity IntroAlloy Cybersecurity Intro
Alloy Cybersecurity Intro
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 

Similar to Comparative review dele

TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
AASTHA76
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
ijtsrd
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
jeanettehully
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
IJNSA Journal
 

Similar to Comparative review dele (20)

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Vulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. docVulnerability Assessment LITERATURE REVIEW. doc
Vulnerability Assessment LITERATURE REVIEW. doc
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Cyber Security Models - CxT Group
Cyber Security Models - CxT GroupCyber Security Models - CxT Group
Cyber Security Models - CxT Group
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Recently uploaded

I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397
Riya Singh
 
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
delhi24hrs1
 
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
rajveerescorts2022
 
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
rajveermohali2022
 
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
Sheetaleventcompany
 
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Sheetaleventcompany
 

Recently uploaded (20)

Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East P...
 
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime TirunelveliTirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
Tirunelveli Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tirunelveli
 
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
Mahim Call Girls in Bandra 7738631006, Sakinaka Call Girls agency, Kurla Call...
 
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime YamunanagarYamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
Yamunanagar Escorts Service Girl ^ 9332606886, WhatsApp Anytime Yamunanagar
 
{ Pooja 9892124323 } girls birds call girls netflix funny names to call girls...
{ Pooja 9892124323 } girls birds call girls netflix funny names to call girls...{ Pooja 9892124323 } girls birds call girls netflix funny names to call girls...
{ Pooja 9892124323 } girls birds call girls netflix funny names to call girls...
 
I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397I am Independent Call girl in noida at chepest price Call Me 8826255397
I am Independent Call girl in noida at chepest price Call Me 8826255397
 
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
Cheap Rate ✨➥9582086666▻✨Call Girls In Gurgaon Sector 10 (Gurgaon)
 
gatiin-namaa-meeqa .pdf
gatiin-namaa-meeqa                        .pdfgatiin-namaa-meeqa                        .pdf
gatiin-namaa-meeqa .pdf
 
Tinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth SkinTinted Sunscreen For Soft and Smooth Skin
Tinted Sunscreen For Soft and Smooth Skin
 
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
Zirakpur Call Girls ✅ Just Call ☎ 9878799926☎ Call Girls Service In Mohali Av...
 
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
@Abortion clinic tablets Kuwait (+918133066128) Abortion Pills IN Kuwait
 
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service ZirakpurZirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
Zirakpur Call Girls Service ❤️🍑 7837612180 👄🫦Independent Escort Service Zirakpur
 
Top 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon BiotechTop 10 Moisturising Cream Brands In India - Stelon Biotech
Top 10 Moisturising Cream Brands In India - Stelon Biotech
 
❤️Amritsar Call Girls☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar ...
❤️Amritsar Call Girls☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar ...❤️Amritsar Call Girls☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar ...
❤️Amritsar Call Girls☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar ...
 
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
Zirakpur Call GIrls Service✔️ 9915851334 ✔️Call Now Ranveer📲 Zirakpur Escort ...
 
Style Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for WinnersStyle Victorious Cute Outfits for Winners
Style Victorious Cute Outfits for Winners
 
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
PREET❤️Call girls in Jalandhar ☎️8264406502☎️ Call Girl service in Jalandhar☎...
 
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
Gorgeous Call Girls In Jaipur {9521753030} ❤️VVIP ANKITA Call Girl in Jaipur ...
 
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your DoorstepCall girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
Call girls in Vashi Service 7738596112 Free Delivery 24x7 at Your Doorstep
 
Ladies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdfLadies kitty party invitation messages and greetings.pdf
Ladies kitty party invitation messages and greetings.pdf
 

Comparative review dele

  • 1. CRITICAL REVIEW: SECURITY ISSUES IN MOBILE NETWORKS Leung, A., Sheng, Y., Cruickshank, H. (2007) The security challenges for mobile ubiquitous services. Information Security Technical Report 12(3) pp 162-171 Zdarsky, F., Robitzsch, S., Banchs, A. (2010) Security analysis of wireless mesh backhauls for mobile networks. Journal of network and computer applications. pp 1-11 INTRODUCTION Security issues in mobile networks is bleeding and have rampaged every sector of life, starting from homes extending into businesses, internets, banks and even into the mobile network world. It is discovered that as technology advances so also theft and hacking increases geometrically. There are so many cases of data loss, stolen credit cards, bank frauds, spam messages, hacking, and virus attacks due to porous security platforms developed. These challenges occur at the user's ends, on the core networks and at the providers end. It is observed that enterprise users now use mobile devices to execute functions which are previously performed from their desktops making the network to be more complex. In order to effectively protect business and non business assets, measures has to be implemented and adopted considering the fact that it must not affect quality and efficient delivery of services to users on the network. Therefore the above has generated an urgent need to focus on providing more comprehensive security solutions especially in mobile networks because they are more vulnerable to attacks and threats. This paper comparatively reviews threat analysis and identifies the appropriate security measures and requirements and subsequently devised good security solutions.
  • 2. BODY The methodology used in these two papers is different but they had the same result. Zdarsky, F., Robitzsch, S., Banchs, A. (2010) evaluated the analysis for security threats which has greatly helped to identify potential risks and attacks on mobile network. He further examined the highest ranking of security threats, analyzing where there could be major threats on the network. He made his analysis by comparing the impact of a threat placing it side by side with the likelihood of the threat so as to know the level of the risk under wireless mesh and management links especially when there is physical attack or when faults are exploited during threat implementation of the network. On the other hand Leung, A., Sheng, Y., Cruickshank, H. (2007) examined threat analysis using a different approach and method by using a pictorial diagram of a man called Jose who was moving from one end to another and still doing all of his activities in a wireless environment e.g. from watching TV to using mobile phone, and contacting service provider, taking a train using his laptop getting to the café and so on. Emphasizing that as Mr. Jose moves from one node to the other which makes him open to threat which could be from the user, provider or the network. From the stated analysis these two authors identifies the various security threat on the networks as threat to user, threat to providers, and as threat to data transport, threat to network mesh and management control. These various threats are critically looked into and narrowed down as spoofing, framing, malware, active and passive threats. Based on the threat analysis discussed above the two papers agree on the basic requirements for proficient security solution e.g. they mentioned providing confidentiality, integrity, authenticity, non repudiation, availability, and privacy. Confidentiality is the assurance that information or data is confined only to the authorized users on the network. Integrity is the case when data is complete and sufficiently perfect and accurate for its purpose. While authenticity establishes that information is genuine and has not been tampered with or forged, a typical example when violated is masquerading. Authentication process is in the three forms namely identification, verification and authentication which are the resources of a network. The non repudiation basically gives protection against false involvement in an action.
  • 3. Availability is also stressed as making that accessible when ever they are needed. The use of network access control must be deployed to make sure the unauthorized users are not allowed to access the network while the authorized users are granted the access. Furthermore, Leung, A. et. al. (2007) examined security threats from three dimensions e.g. user, network and service provider. He highlighted the various ways by which a user can be subjected to security threats e.g. spoofing, information disclosure, profiling, framing, malware, information overloading, configuration complexity, security parameters. He mentioned a key point of how a network could be opened to security threats e.g. passive and active threats. Passive threat is a threat where a party that is unauthorized gains access to data and he does not change its content i.e. eavesdropping and traffic analysis while active threat is when attackers make changes to data, messages modifications, denial of services. However the approach of Zdarsky, F. et. al. (2010) identifies security threat in three ways, under management and control, data transport, network entities. He emphasized passive and active traffic analysis; he said security threat can emerge as a result of faulty softwares thereby creating avenues for network attackers. He also mentioned that the attackers could have classical software having sophisticated conglomerate. In order to provide lasting security solutions to the aforementioned security threats Leung, A. et. al. (2007) emphasized on two main clues which are by developing trusted computing and integration of IPSec with AAA (Authentication, Authority and Account) and hierarchical mobile IPv6 on the mobile network. Trusted computing is achieved by incorporating a trusted hardware functionality that would provide a trusted platform module. IPSec is fundamentally secures information traffics on the core network while AAA is used to authenticate mobile signal nodes. IPSec is a layer protocol that ensures via sending and receiving of cryptographically data packets with modifications. In the other paper "Zdarsky, F. et. al. (2010)" he stressed the need to avoid a state without authorization, control signaling, and also to avoid single points of failure.
  • 4. CONCLUSION The two papers have clearly and fully established security threats and were able to streamline it down to mobile networks using different methodology emphasizing that they are more vulnerable to security attacks on the ad hoc network. They both highlighted the various security challenges and issues under mobile network in a diverse form and subsequently provided possible solutions to avert mobile networks breakdown as a result of security threats and attacks. Most importantly Leung, A. et. al. (2007) was able to deliver a descriptive methodology. He gave a strong and deep technical analysis of security threat and he provided concrete technical solutions which could give a long lasting solution to security attacks and also left some open issues on security threats while Zdarsky, F. et. al. (2010) was just writing on the surface although he dwelled too much in analyzing security threats but he did not provide a silver bullet answer to security solutions which is a key under this topic. However the two papers are recommendable, personally I will look at Leung, A. et. al. (2007) as an experienced expatriate in security issues especially in mobile networks while Zdarsky, F. et. al. (2010) could be a senior apprentice in mobile network security matters judging by the content of their respective papers.