Abstract
This paper explores various approaches used to relaxed mobile devices from intrusions in wireless networks. The contemporary strategies contemporary security, inclusive of encryption, authentication and authorization strategies, is discussed in detail. The advantages and downsides latest approach are mentioned to decide the satisfactory technique for mobile tool safety. Furthermore, numerous emerging security measures such as the ones primarily based on biometrics and context-consciousness are evaluated and compared. The abilities and obstacles trendy method are analyzed relative to these options. These research paper goals to discover new possibilities for security contemporary cell devices in Wi-Fi networks for reinforcing relaxed facts transactions and conversation. The paper outlines the contribution contemporary security methods to enhance the security degree cutting-edge cellular devices, and suggest effective strategies to defend towards capability security threats. Similarly, the paper will offer an in-depth survey present day security technology and their implementation challenges in the wireless domestic community surroundings.
| Original language | American English |
|---|---|
| Title of host publication | 2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9798350370249 |
| DOIs | |
| State | Indexed - 2024 |
| Externally published | Yes |
| Event | 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 - Kamand, India Duration: 24 Jun 2024 → 28 Jun 2024 |
Publication series
| Name | 2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 |
|---|
Conference
| Conference | 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 |
|---|---|
| Country/Territory | India |
| City | Kamand |
| Period | 24/06/24 → 28/06/24 |
Bibliographical note
Publisher Copyright:©2024 IEEE.
Keywords
- Community
- Devices
- Domestic
- Implementation
- Survey
Fingerprint
Dive into the research topics of 'Exploring the Approaches to Secure Mobile Devices in Wireless Networks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver