Mobile computing and communication is a rapidly developing area. But mobility is associated with the problems of security and privacy beyond those in open networks. A well-known threat is tracking user movements. New risks are caused by the mobility of users. This paper represents four mobile transaction management models and a comparison between them which shows that all of them work without security transmission between mobile host (MH) and base station (BS).Moreover, this paper proposed new mode to keep data transmission at protected level.
Mobile computing and communication is a rapidly developing area. But mobility is associated with the problems of security and privacy beyond those in open networks. A well-known threat is tracking user movements. New risks are caused by the mobility of users. This paper represents four mobile tr...
مادة فرعية