A Review On Security In Mobile Cloud Computing

International Journal of Mobile Computing and Application
© 2019 by SSRG - IJMCA Journal
Volume 6 Issue 2
Year of Publication : 2019
Authors : Dr.I.Lakshmi
pdf
Citation:
MLA Style:

Dr.I.Lakshmi, "A Review On Security In Mobile Cloud Computing" SSRG International Journal of Mobile Computing and Application 6.2 (2019): 4-11.

APA Style:

Dr.I.Lakshmi,(2019). A Review On Security In Mobile Cloud Computing. SSRG International Journal of Mobile Computing and Application 6(2), 4-11.

Abstract:

As more and more people enjoy the various services brought by mobile computing, it is becoming a global trend in today’s world. At the same time, securing mobile computing has been paid increasing attention. In this article, we discuss the security issues in mobile computing environment. We analyze the security risks confronted by mobile computing and present the existing security mechanisms.

References:

[1] “LAN Standards of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical
layer (PHY) specification. IEEE Standard 802.11, 1999 Edition,” 1999.
[2] D. P. Agrawal and Q-A. Zeng, Introduction to Wireless and Mobile Systems, Brooks/Cole publisher, 2002.
[3] J. Walker, “Overview of IEEE 802.11b Security”, http://www.intel.com/technology/itj/q22000/pdf/art_5.pdf.
[4] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting Mobile Communications: the Insecurity of 802.11”, http://www.isaac.cs.berkeley.edu/isaac/mobicom.pdf
[5] B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A Secure Routing Protocol for Ad Hoc Networks,” Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001.
[6] M. G. Zapata, “Secure Ad hoc On-Demand Distance Vector Routing,” ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6 , No. 3, pp. 106-107, 2002.
[7] Y. C. Hu and D. B. Johnson and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad-Hoc Networks,” Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp. 3-13, 2002.
[8] Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proceedings of the 8th ACM International Conference on Mobile Computing and Networking,September, 2002.
[9] A. Perrig, R. Canetti, B. Whillock, "TESLA: Multicast Source Authentication Transform Specification", http://www.ietf.org/internet-drafts/draft-ietf-msec-tesla-spec-00.txt, October 2002.
[10] L. Venkatraman and D. P. Agrawal, "Startegies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks," JPDC Special Issue on Mobile Ad Hoc
Networking and Computing, Vol. 63, No. 2, Feb. 2003, pp. 214-227.
[11] P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks,” Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002.
[12] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom'2000), Aug 2000.
[13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th International Conference on Mobile Computing and Networking (MOBICOM’00), pp.255-265, August 2000.
[14] H. Deng, Q-A. Zeng, and D. P. Agrawal, "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks," IEEE Vehicular Technology Conference, Orlando, October 6-9, Fall, 2003.
[15] L. Zhou and Z. J. Hass,”Securing Ad Hoc Networks,” IEEE Networks Special Issue on Network Security, November/December, 1999.
[16] Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” Proceedings of the IEEE 9th International Conference on Network Protocols (ICNP'01), 2001.
[17] Levente Buttyan and Jean-Pierre Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs,” Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.
[18] Pietro Michiardi, Refik Molva, “Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks,” Proceedings of the Conference on Communication and Multimedia Security, 2002.

Key Words:

Mobile Cloud Computing , Security