The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that are possible to co-exist within a single network, mobile subscribers could subscribe to these services concurrently while ubiquitous. However, the existing group key management (GKM) protocols...
Cloud computing offers and allows users to use infrastructure, platforms, and software as services. With the advent of mobile computing, and cloud computing supporting mobile services, a merger of both these computing has opened a new domain of mobile cloud computing. Predictably, this has given way to a large number of issues coming forward, first and foremost among them, being, security. This paper...
An integrated heterogeneous wireless system (IHWS) combines different wireless access technologies together and provides a user with ubiquitous network connectivity. Security in such network is extremely critical for its successful implementation. However, each underlying network in an IHWS has a unique security scheme that cannot be adopted by other networks. Several security algorithms that have...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
In mobile IP, the home agent (HA) is an essential component. Mobile nodes will not function properly if the HA cannot be reached. Enhanced Route Optimization applies the Cryptographically Generated Home Address in the Mobile IPv6, to enhance the security and reduce the handoff delays. Unfortunately, it cannot provide home prefix validation. Communication with the Home Agent is still required to avoid...
In recent years mobile transactions have attracted a large number of clients. Being a more convenient and secured approach to perform remote governmental transactions than Internet, mobile transaction has turned into a more appealing method than previous methods. However, implementing wireless communication technologies may result in more complicated information security issues. This paper discusses...
In this paper, it first analyzes the present security protocol for mobile communications. Furthermore, a security framework for the Mobile E-Service is proposed. In the mean time, using the inherent security and expansibility of J2ME, we design a security message flow model to support communication protocol for the Mobile E-Service Oriented Architecture (MSOA), which emphasizes the authentication...
The exponential growth of the Short Message Service(SMS) use has led this service to a widespread tool for social, marketing and advertising messaging. The mobile devices are quickly becoming Personal Trust Devices (PTD), embedding personal data, which allow sending/receiving private information from/to the PTD. This paper introduces our Trusted-SMS system, which allows users to exchange non-repudiable...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then, its security was analyzed from the angle of technical realization and formal analysis to verify whether the original...
Recently, the open mobile alliance (OMA) has been set to define open DRM technologic specifications to protect copyrighted content against piracy, unauthorized use and distribution over mobile networks. This paper proposes an efficient OMA DRM v2.0 ROAP for protecting a rights object for a device. Our proposed ROAP can offer a more efficient DRM system for future mobile networks.
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms...
The presented mobile DRM are short of an efficient payment protocol to guarantee that participants can engage in the exchange without the risk of suffering a disadvantage. Even the latest DRM standard of the open mobile alliance (OMA) did not give a detailed transaction scheme in mobile DRM. In general, the fair payment approaches in mobile DRM rely on the service of an external trusted third party...
Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the success of their Internet bound equivalents. Many mobile solutions try to augment the functionality of existing platforms with location awareness. The price for mobility, however, is typically either the lack of the popular friendship...
With the development of wireless mobile networks, more security issues, such as identity spoof, DoS attack, ARP attack, have been exposed out recently. Meanwhile, mobile nodes require higher performance of handover. However, existing solutions cannot solve the problems flexibly and effectively. In this paper, we present an identity based secure and fast authentication protocol (IBSFAP) for mobile...
Mobile service raises a number of security and privacy challenges. To address this, we present an approach in which the mobile information security is enhanced by using external security key and specified policies. An electronic security key (eKey) is connected to the mobile device by adaptable interface for enhancing the security ability and storing private data. Front end administration module (FAM)...
With dynamic home agent address discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suffers from security problems as the signaling is not authenticated nor integrity protected. The IETF has defined SEcure Neighbor Discovery that is providing security for the IPv6 Neighbor Discovery protocol, based on several...
We study the problem of secure routing in wireless sensor networks where the sensors and the sink can move during the execution of remote monitoring applications and communication is not necessarily directed towards the sink. We present a new routing protocol that builds upon a collection of mechanisms so that the integrity and confidentiality of the information reported to the controlling authorities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.