Research Article
A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
Table 3
Comparison of wireless mobile network security under different methods.
| Performance test name | The method of this paper | Reference [11] method | Reference [12] method |
| Information confidentiality | High | Medium | Medium | Information integrity | High | High | Medium | Forward security | High | Low | High | Key guessing attack resistance | High | High | Low | Intrusion attack level | High | Medium | Medium | Server-side data confidentiality | High | Low | Medium | Safety level certification | High | Low | High | Creature template attack | High | High | Low | Defend against unreliable users | High | Medium | High |
|
|