The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always been vulnerable to numerous privacy threats. The more we aim at safe usage of location based services, the more we feel the necessity of a secure location privacy system. Most of the existing systems adopt the mechanism of satisfying...
Countless challenges to preserving a userpsilas location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive use of Location-based Services. It is not possible to access Location-based services and, at the same time, to preserve privacy when the user provides his exact location information. To achieve privacy, most third party...
Traditional computer systems and small distributed networks rely on users' authentication to provide security. However, this strategy is extremely inadequate for the increased flexibility of pervasive environments, where users join and leave frequently. Here, users want to discover services dynamically and share them safely taking into account some constraints such as limited computational power and...
There is a huge prevalence of mobile devices being connected to the Internet because of high demands for information access and dissemination. It is now well understood that XML plays a vital role as a means for information representation, exchange, and storage. Naturally, XML data is exchanged and stored as these mobile devices communicate with each other, and over the web. A major concern for one...
The deployment of small handheld devices in a pervasive environment inevitably raises security concerns while sharing services. Trust models play a major role in guarding against privacy violations and security breaches. Though assignment of initial trust is an important issue, little work has been done in this area. Most of the prior research on trust models assume a constant level of the initial...
RFID has become a predominant technology in supply chain in the past few years. It's becoming so popular that even it's been used for home environment for personal use. But with the increasing popularity there is also a potential rise of security concern. This concern amongst consumer has led the researcher to concentrate on the potential threats of this technology. The main challenge of a secured...
RFID tags are a new generation of small devices used for identification in many applications today. RFID authentication plays an important role in applications where security and privacy is a major concern. As an example, RFID has gained appreciation as an emerging technology to thwart counterfeiting problems. Public key cryptography (PKC) provides an impeccable solution to the counterfeiting problem...
Handheld devices in a pervasive computing environment are prone to security as well as privacy violations, while discovering, sharing and accessing services and contents. Trust models are devised to fight against such violations and breaches. Although initial trust assignment is an important issue in evolving overall trust, a little amount of work has been done in this field so far. In pervasive smart...
We design and implement a low cost, easy to deploy and lightweight location tracking solution that operates without the need for a fixed infrastructure. We call it "WiFi radar," which uses the signal strength of radio transmissions to determine the position (distance and direction) of devices with near linear approximation. Notwithstanding the challenges that radio frequency signals pose...
The emergence of new technologies and the proliferation of mobile and handheld devices have facilitated development of context-based services. Common examples include the location based services. However, the revelation of the context and static information gives rise to new and very complex privacy concerns in such services. In this paper, we propose a formal model to regulate the privacy level of...
For RFID tags to proliferate in our day to day life, they will have to offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant...
Rapid development of innovative location-centric applications promoted through widespread proliferation of wireless technology and availability of small handheld devices have brought about a new era in pervasive computing. Besides, they are constantly challenged by individual privacy protection necessities as the location information are stored and exchanged among entities and service providers. In...
To address the challenges posed by device capacity and capability, and also the nature of ad-hoc network of pervasive computing, a resource discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this...
The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible...
Several security threats in RFID systems are obstacles to intermingle this technology into human lives. On the other hand ensuring flexible privacy mechanism has been a challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we describe...
From container terminals, healthcare services, libraries to household, the role of Asset Tracking Applications has become indispensable. As the organizations grow, so do their volume of assets, soon it becomes very cumbersome to track these assets in real time and accurately prepare a financial report to avoid overbuys. Rapid development of Wireless Area Network and Radio Frequency transmitting active...
The widespread prevalence of pervasive devices and applications has raised the concerns of privacy. Granting Access to Resources and Context sensitive information causes information leakage through inference or obfuscation. Again, the open and dynamic collaborative environment of pervasive computing has rendered the traditional access control models like Role based models to be unfit. Even though...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld devices in a pervasive computing environment. Effective sharing of resources is facilitating tiny pervasive devices to benefit from situations which otherwise would not have been possible due to several limitations (such as poor storage and computational capability). An unavoidable consequence of this...
Inter device dependency and mutual cooperation of devices is a must in pervasive computing environment. This is to overcome the barriers posed by several shortcomings of pervasive environment including limited memory and computational capability, poor battery power etc. The knowledge of valid, authenticated devices is vital in this scenario to ensure security and privacy. At the same time we have...
Users of handheld devices may want to share services resources with each other in pervasive computing environment. Availability of information regarding users may lead to privacy violations while communicating with others for services and resources. Providing a model to resolve this issue in centralized or distributed environment is not desirable or not feasible if we really want to achieve ubiquity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.