Management and Operations of 4G Networks

2012 ◽  
Vol 3 (4) ◽  
pp. 95-99
Author(s):  
Sridevi Sridevi ◽  
Keyword(s):  
2003 ◽  
Vol 8 (1) ◽  
pp. 5-25 ◽  
Author(s):  
Lester T. W. Ho ◽  
Louis G. Samuel ◽  
Jonathan M. Pitts

Author(s):  
Thouraya Toukabri ◽  
Adel Mounir Said ◽  
Emad Abd-Elrahman ◽  
Hossam Afifi
Keyword(s):  

2018 ◽  
pp. 235-270
Author(s):  
K.R. Rao ◽  
Zoran S. Bojkovic ◽  
Dragorad A. Milovanovic
Keyword(s):  

Author(s):  
Dimitris Charilas ◽  
Stavroula Vassaki ◽  
Athanasios Panagopoulos ◽  
Philip Constantinou

Author(s):  
Dimitris Charilas ◽  
Stavroula Vassaki ◽  
Athanasios Panagopoulos ◽  
Philip Constantinou

Author(s):  
Geoffrey Tyolaha ◽  
Moses Israel

In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach. The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way. This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.


Author(s):  
M. Lakshmanan ◽  
V. Noor Mohammed ◽  
M. Palanivelan ◽  
P. Siva Kumar
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document