Research Article
An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing
Table 4
Characteristics comparison and analysis among the existing methods and the proposed method.
| Criteria | Method | Wen-chu Hsieh [3] |
Nyanchama and Osborn [6] | m-IPS |
| Rogue AP | △ | ○ | ○ | Evil twin | △ | ○ | ○ | MAC spoofing | △ | ○ | ○ | MIMT | △ | ○ | ○ | DoS attack | △ | ○ | ○ | Honeypot | △ | ○ | ○ | Access control with m-IPS and C_RBAC |
× |
× | ○ |
|
|
○: strong, △: medium, and ×: weak.
|