Research Article
An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing
Table 4
Characteristics comparison and analysis among the existing methods and the proposed method.
| | Criteria | Method | | Wen-chu Hsieh [3] |
Nyanchama and Osborn [6] | m-IPS |
| | Rogue AP | △ | ○ | ○ | | Evil twin | △ | ○ | ○ | | MAC spoofing | △ | ○ | ○ | | MIMT | △ | ○ | ○ | | DoS attack | △ | ○ | ○ | | Honeypot | △ | ○ | ○ | | Access control with m-IPS and C_RBAC |
× |
× | ○ |
|
|
○: strong, △: medium, and ×: weak.
|