The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile clouds fuse cloud computing and mobile computing with wireless networking in everyday life. Many applications of mobile clouds deploy GPS (Global Positioning System) to find locations and to synchronize clocks. Though security starts to draw scrutiny from academy, industry, and government, authentication in GPS-directed mobile clouds has not been brought to the table. Authentication of GPS...
The Global Positioning System (GPS) grows into a ubiquitous utility that provides positioning, navigation, and timing (PNT) services. As an essential element of the global information infrastructure, cyber security of GPS faces serious challenges. Some mission-critical systems even rely on GPS as a security measure. However, civilian GPS itself has no protection against malicious acts such as spoofing...
This paper presents a novel two-tier authentication and encryption scheme that explores the unique characteristics of Wireless Sensor Networks (WSN) in Healthcare Applications. The first phase authenticates among the sensor nodes of a Body Area Network (BAN) fused in a patient, where a U key is generated in a decentralized fashion. Based on the rule of separating user and platform credentials, U key...
In this paper, we propose a secure architecture for healthcare wireless sensor networks. After a careful examination of the security requirements and the security threats to healthcare sensor networks, we argue that security measures for Wireless Sensor Networks (WSN) must take application context in consideration rather than seek security solutions in a one-size-fits-all fashion. We integrate security...
In this paper, we propose a novel two-tier authentication scheme based on physiology. Our sensors are fused with a patient, where a physiological key is generated in a decentralized fashion. Secure aggregation and secure routing are deployed in the authentication procedure. This scheme lies on our unique secure architecture for Healthcare WSN that explores the characteristics of Healthcare WSN, departing...
Content aware storage (CAS) is a model of storage facility. In this paper, we present a prototype of CAS area network system implemented at Tsinghua University in China (THCASN) compliant to the OSD T-10 standard. Experimental results of performance comparing THCASN with NFS and iSCSI storage are described. The experimental results demonstrate the performance of THCASN is comparable to and better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.