Abstract

Within the previous few years, the globe of mobile computing has grown enormously. Devices like PDAs, handhelds and digital cellular phones that started off as gadgets of luxury became a necessity in today's "always-stay-connected" method. To facilitate quality of such devices whereas not disconnection from the network, Mobile scientific discipline came into existence. this permits the mobile node to use 2 scientific discipline addresses: a tough and quick home address and a care-of address that changes at each new purpose of attachment. but with the advantages of Mobile scientific discipline to boot came the disadvantages, the biggest of them being that of security. throughout this paper, we've got a bent to debate a number of the common security threats that mobile scientific discipline networks square measure exposed to what is more as some planned solutions to agitate such threats. The recent years have witnessed an unbelievable growth among the vary of mobile internet users and they would really like for quality support is indispensable for seamless internet property. Mobile scientific discipline may be a top quality support protocol that supports roaming across multiple Access Points whereas not having to re-establish the highest to end affiliation. throughout this paper, we've got a bent to require the position that despite several challenges that Mobile scientific discipline faces, it would sway be the protocol for supporting quality among the longer term. we've got a bent to support our claim by analyzing the factors which will influence the widespread adoption of Mobile scientific discipline which we tend to go any to dialogue the counter claims in a trial to convert the reader that the advantages of Mobile scientific discipline outweighs its disadvantage.

Keywords:
Roaming Computer science Computer security Internet privacy The Internet Cloud computing Mobile device Globe Mobile computing Quality (philosophy) World Wide Web Telecommunications

Metrics

55
Cited By
8.07
FWCI (Field Weighted Citation Impact)
1
Refs
0.97
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Big Data and Digital Economy
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Survey on security threats in mobile cloud computing

S. IniyanM. SenthilrajaR. SrinivasanA. Palaniraj

Journal:   International Journal of Engineering & Technology Year: 2018 Vol: 7 (1.9)Pages: 238-238
JOURNAL ARTICLE

Mobile Computing : Security Threats

SweetyJabir Singh

Journal:   International Journal of Scientific Research in Science Engineering and Technology Year: 2016 Vol: 2 (5)Pages: 160-162
JOURNAL ARTICLE

Security Threats in Cloud Computing

Harsh GuptaDeepak Kumar

Year: 2019 Pages: 1158-1162
© 2026 ScienceGate Book Chapters — All rights reserved.