Research Article

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

Table 2

Classification of wireless security threats during business work using mobile devices.

Threat classificationConfidentialityIntegrityAvailability

Rogue APoo
Ad hoc networko
Evil twin/honeypot APoo
RF jammingo
Deauthenticationo
MAC spoofingoo
WEP key crackingoo
Sniffingo

o: effect, —: no effect.