Safety technologies impacts survey in M-services security provision

Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the mservices area is the security issue. Different papers have discussed various aspects of secured networks. But, until now a extensive ranking approach has not been presented to overcome the security issues. In this paper, first the security technologies and their applications have reviewed. Then the future trends of mobile technology in the world and current condition of mobile users in Iran have investigated. The result of literature reviews showed 13 security technologies and 6 groups of applications. In the next step, with designing a questionnaire for collecting and analyzing the opinion of experts, the importance of different security technologies within six types of mobile service have scrutinized.

[1]  Ulla Koivukoski,et al.  Managing Mobile Services: Technologies and Business Practices , 2005 .

[2]  D. Brent Chapman,et al.  Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.

[3]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[4]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[5]  Athanasios Karantjias,et al.  A Secure Mobile Framework for m-Services , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[6]  John A. Clark,et al.  A Survey of Authentication Protocol Literature , 2010 .

[7]  Perry B. Gentry What is a VPN? , 2001, Inf. Secur. Tech. Rep..

[8]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[9]  Upkar Varshney,et al.  Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..

[10]  Fatemeh Saghafi,et al.  Ranking secure technologies in security provision financial transactions mobile commerce , 2009, ICIS.

[11]  Abdullah Al Hasib,et al.  Towards Public Key Infrastructure less authentication in Session Initiation Protocol , 2010, ArXiv.

[12]  Ray Hunt,et al.  A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks , 2008, Int. J. Internet Protoc. Technol..

[13]  D. Richard Kuhn,et al.  SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .