Research Article

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

Table 4

Characteristics comparison and analysis among the existing methods and the proposed method.

CriteriaMethod
Wen-chu Hsieh [3] Nyanchama and Osborn [6]m-IPS

Rogue AP
Evil twin
MAC spoofing
MIMT
DoS attack
Honeypot
Access control with m-IPS and C_RBAC × ×

○: strong, △: medium, and ×: weak.