{"title":"Smartphone's hotspot security issues and challenges","authors":"Al Harthy Khoula, N. Shah, Arun Shankarappa","doi":"10.1109/ICITST.2016.7856680","DOIUrl":null,"url":null,"abstract":"Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited research efforts in threat detection mechanisms for smartphone hotspot connections. This paper will propose a smartphone hotspot Intrusion Detection system (IDS) which simulates the detection of the attacks (especially DOS attacks), on smartphone hotspot connections. The proposed architecture is realized into a prototype, which takes into account primary and secondary data collected related to threats. The novelty of the proposed system is in utilization of historical logs to take decisions regarding user access to hotspot connections.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"582 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2016.7856680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited research efforts in threat detection mechanisms for smartphone hotspot connections. This paper will propose a smartphone hotspot Intrusion Detection system (IDS) which simulates the detection of the attacks (especially DOS attacks), on smartphone hotspot connections. The proposed architecture is realized into a prototype, which takes into account primary and secondary data collected related to threats. The novelty of the proposed system is in utilization of historical logs to take decisions regarding user access to hotspot connections.