IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v10y2018i2p18-d131130.html
   My bibliography  Save this article

Security and Privacy in Wireless and Mobile Networks

Author

Listed:
  • Georgios Kambourakis

    (Department of Information and Communication Systems Engineering, University of the Aegean, 83100 Karlovasi, Samos, Greece)

  • Felix Gomez Marmol

    (Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain)

  • Guojun Wang

    (School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China)

Abstract

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous [...]

Suggested Citation

  • Georgios Kambourakis & Felix Gomez Marmol & Guojun Wang, 2018. "Security and Privacy in Wireless and Mobile Networks," Future Internet, MDPI, vol. 10(2), pages 1-3, February.
  • Handle: RePEc:gam:jftint:v:10:y:2018:i:2:p:18-:d:131130
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/10/2/18/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/10/2/18/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Zhibin Zhou & Pin Liu & Qin Liu & Guojun Wang, 2018. "An Anonymous Offline RFID Grouping-Proof Protocol," Future Internet, MDPI, vol. 10(1), pages 1-15, January.
    2. Stylianos S. Mamais & George Theodorakopoulos, 2017. "Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems," Future Internet, MDPI, vol. 9(4), pages 1-23, November.
    3. Vasileios Gkioulos & Gaute Wangen & Sokratis K. Katsikas, 2017. "User Modelling Validation over the Security Awareness of Digital Natives," Future Internet, MDPI, vol. 9(3), pages 1-16, July.
    4. Wenjuan Li & Weizhi Meng & Lam For Kwok, 2018. "Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks," Future Internet, MDPI, vol. 10(1), pages 1-16, January.
    5. Jingsha He & Qi Xiao & Peng He & Muhammad Salman Pathan, 2017. "An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning," Future Internet, MDPI, vol. 9(1), pages 1-15, March.
    6. Stylianos S. Mamais & George Theodorakopoulos, 2017. "Private and Secure Distribution of Targeted Advertisements to Mobile Phones," Future Internet, MDPI, vol. 9(2), pages 1-21, May.
    7. Pierpaolo Loreti & Lorenzo Bracciale & Alberto Caponi, 2018. "Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications," Future Internet, MDPI, vol. 10(2), pages 1-17, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. S. Nagaraj & Atul B. Kathole & Leena Arya & Neha Tyagi & S. B. Goyal & Anand Singh Rajawat & Maria Simona Raboaca & Traian Candin Mihaltan & Chaman Verma & George Suciu, 2022. "Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks," Energies, MDPI, vol. 16(1), pages 1-16, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Philip Nyblom & Gaute Wangen & Vasileios Gkioulos, 2020. "Risk Perceptions on Social Media Use in Norway," Future Internet, MDPI, vol. 12(12), pages 1-40, November.
    2. Guoying Lin & Yuyao Yang & Feng Pan & Sijian Zhang & Fen Wang & Shuai Fan, 2019. "An Optimal Energy-Saving Strategy for Home Energy Management Systems with Bounded Customer Rationality," Future Internet, MDPI, vol. 11(4), pages 1-16, April.
    3. Stylianos S. Mamais & George Theodorakopoulos, 2017. "Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems," Future Internet, MDPI, vol. 9(4), pages 1-23, November.

    More about this item

    Keywords

    n/a;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:10:y:2018:i:2:p:18-:d:131130. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.