Wireless security: securing mobile UMTS communications from interoperation of GSM.
Eric SouthernAbdelkader H. OudaAbdallah ShamiPublished in: Secur. Commun. Networks (2013)
Keyphrases
- mobile communication
- wifi
- mobile users
- mobile devices
- information security
- base station
- mobile networks
- mobile communications
- ad hoc networking
- wireless internet
- wireless communication
- mobile commerce
- mobile computing environment
- communication technologies
- mobile computing
- smart phones
- mobile phone
- wireless systems
- wireless networks
- border control
- cellular networks
- mobile internet
- mobile applications
- wireless link
- communication networks
- wireless devices
- ubiquitous computing
- wireless access
- mobile services
- security architecture
- wireless technologies
- context aware
- security issues
- network security
- security policies
- internet access
- mobile environments
- end to end
- short message service
- communication systems
- identity management
- mobile learning
- security requirements
- homeland security
- rfid tags
- routing protocol
- mobile agents
- access control
- remote control
- physical layer
- location management
- network management
- mobile technologies
- smart card
- intrusion detection
- sensor networks
- mobile terminals
- multi hop
- fourth generation
- energy consumption
- mobile ad hoc networks
- wireless local area network
- portable devices
- network access
- network connectivity
- heterogeneous networks
- video conferencing
- location based services
- ad hoc networks
- data sources