The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
External storage devices, such as USB-sticks, SD-cards, or other flash memory devices, are widely used today. These devices may pose a threat if they contain sensitive data and are then lost or forgotten somewhere. Usability of existing encryption solutions for such external storage media is limited because of the need to reenter keys or authentication credentials every time the media is plugged to...
The multimedia broadcast multicast service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved MBMS (e-MBMS) architecture is currently being standardized. This position paper discusses the security issues currently being considered for the e-MBMS IP multicast user plane. Currently proposed security architectures ldquolimitrdquo...
Handover in future wireless communication systems must be seamless. Current IP-level mobility protocols have difficulties meeting the stringent handover delay requirements. At the same time they do not give sufficient control to the network to optimize the handover process and they do not deal well with slow connection setups of some wireless technologies. In this paper we propose an enhancement of...
3GPP service architecture evolution (SAE) / long term evolution (LTE) activity sets the requirement of provisioning secure and seamless handover. In handover, however, key management (i.e., key derivation and key transfer) and mutual authentication form a significant source of latency. Together with the seamlessness requirement 3GPP also requires the reuse of universal subscriber identity module (USIM)...
In network-based localized mobility management (NETLMM), a mobile node is not involved in signalling related to mobility support, and keeps the same IP address after handoff from one link to another. The mobile node's current access router acts as a mobility access gateway by sending Proxy Local Binding Updates to the local mobility anchor on behalf of the mobile node. Due to some properties of the...
In this paper we elaborate on the challenges that come with pervasive computing for providing security that enables users to explore the new dimension of computing and communications and do not hinder them. The paper is structured as follows: We first sketch an ideal state which we believe is desirable to achieve. We argue that, in fact, the continuation of current security practices is not possible...
Networks are becoming more dynamic, not only as a result of mobility, but also due to service requirements, business aspects, and other reasons. This dynamicity will also reflect on charging and billing, requiring a fresh look at charging and billing from both the business side and the technical side. This paper presents the concepts and mechanisms for dynamic charging and billing in ambient networks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.