Security Challenges in Mobile Networks: A Survey of Threats and Mitigation Techniques

Authors

  • Aarti Sharma Student, Delhi University (School of open learning)

Keywords:

Mobile Network Security, Malware, 5G, IoT, Man-in-the-Middle Attack, DDoS, Network Segmentation, Authentication, Encryption, Threat Mitigation

Abstract

Mobile networks have evolved rapidly, becoming integral to both personal and professional communication, particularly in an era where the Internet of Things (IoT) and 5G are reshaping connectivity landscapes. However, these networks face an array of security challenges, from malware and unauthorized access to sophisticated, targeted attacks that exploit vulnerabilities in mobile operating systems and network protocols. This article surveys the various threats facing mobile networks and explores mitigation techniques to secure these increasingly complex environments. We categorize the threats, examine their impact on network integrity and data privacy, and highlight security measures and best practices that can address these challenges effectively.

References

1. Alcaraz, C., & Lopez, J. (2011). Security in the Internet of Things: A Survey. International Journal of Computer
Science and Network Security, 11(12), 120-127.
2. Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why Phishing Works. Proceedings of the SIGCHI Conference
on Human Factors in Computing Systems, 581-590.https://doi.org/10.1145/1124772.1124851
3. Farooq, M. U., & Razzaq, A. (2020). A Survey on Security and Privacy in 5G Networks. International Journal
of Computer Applications, 177(16), 1-9. https://doi.org/10.5120/ijca2020920534

Published

2025-08-06