Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

Keke Gai, Meikang Qiu*, Lixin Tao, Yongxin Zhu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

110 Citations (Scopus)

Abstract

Mobile cloud computing is applied in multiple industries to obtain cloud-based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud-based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well-protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment.

Original languageEnglish
Pages (from-to)3049-3058
Number of pages10
JournalSecurity and Communication Networks
Volume9
Issue number16
DOIs
Publication statusPublished - 10 Nov 2016
Externally publishedYes

Keywords

  • heterogeneous 5G
  • intrusion detection
  • mobile cloud computing
  • security

Fingerprint

Dive into the research topics of 'Intrusion detection techniques for mobile cloud computing in heterogeneous 5G'. Together they form a unique fingerprint.

Cite this