Security Challenges in Mobile Networks: A Survey of Threats and Mitigation Techniques
Keywords:
Mobile Network Security, Malware, 5G, IoT, Man-in-the-Middle Attack, DDoS, Network Segmentation, Authentication, Encryption, Threat MitigationAbstract
Mobile networks have evolved rapidly, becoming integral to both personal and professional communication, particularly in an era where the Internet of Things (IoT) and 5G are reshaping connectivity landscapes. However, these networks face an array of security challenges, from malware and unauthorized access to sophisticated, targeted attacks that exploit vulnerabilities in mobile operating systems and network protocols. This article surveys the various threats facing mobile networks and explores mitigation techniques to secure these increasingly complex environments. We categorize the threats, examine their impact on network integrity and data privacy, and highlight security measures and best practices that can address these challenges effectively.
References
Science and Network Security, 11(12), 120-127.
2. Dhamija, R., Tygar, J. D., & Hearst, M. (2006). Why Phishing Works. Proceedings of the SIGCHI Conference
on Human Factors in Computing Systems, 581-590.https://doi.org/10.1145/1124772.1124851
3. Farooq, M. U., & Razzaq, A. (2020). A Survey on Security and Privacy in 5G Networks. International Journal
of Computer Applications, 177(16), 1-9. https://doi.org/10.5120/ijca2020920534