The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Physical layer security has become popular in recent years. In satellite communication systems, wire-tap users are easy to obtain information from satellite side for the range of the beam is broad. In this work, we consider the multi user scenario, by adopting the dynamic beam forming in satellite networks, the beam could be restricted into the small range, where wire-tap users could not obtain information...
The system proposed is a door unlocking system containing multiple doors any of which can be used to access a certain zone e.g. a laboratory or library. The system is implemented using a central server which contains a central database gathering all the information about the authorized personnel. The hardware components required are RFID reader, passive RFID tags, wireless transmitter & receiver...
One of the emerging researches in ubiquitous computing area is smart home environment. Smart Home environment is designed to provide the user with minimal interaction towards home appliances such as fan control, light, security monitoring temperature monitoring and wireless electrical switches. However, the communication between base station (central hub) with remote device (smart phone) can easily...
In an ideal ubiquitous network, everyone can access the Internet when some connectivity exists there. A network administrator is supposed to provide a connection to public visitors securely. In this paper, we propose a secure public wireless Internet service model using Host identity Protocol (HIP). Services based on the model allow everyone to provide a connection. We give some consideration to its...
The secure “pairing” of wireless devices based on out-of-band communication is an established research direction. Unfortunately, this approach is prone to human errors that lead to man-in-the-middle attacks. To address this and to better motivate users, this paper proposes the use of computer games for pairing. Games make the pairing process enjoyable and engaging, thus improving its usability and...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
This paper discusses the new technologies in u-commerce, including: wireless technology, new voice recognition and radio frequency technology, new digital TV technology, microprocessor technology. And then reviews the main issues, including: value and privacy.
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
Process control systems and Supervisory Control and Data Acquisition (SCADA) systems use computers to control physical processes in many critical industries including electric power generation, electric power distribution, gas pipelines, waste treatment, water distribution, and many others. Because process control systems can be spread over large distances, wired connections become infeasible. Commercially...
Within the home domain, an outcome of successfully implemented ubiquitous computing is expected to feature an ever-present and - most importantly, convenient to use - ubiquitous home environment. Home automation and wireless sensor networks, as ubiquitous integrations of technology and services at home, are enhancing the quality of life by improved security, information and comfort. We have defined...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
The platform for the railroad is not sufficient to provide intelligent services. Currently, the railroad system provides limited services. However, the demands for information related to environments of train are increasing. In this paper, we propose the platform which can provide context-aware information services, intelligent services and integrated services quality of service. It can establish...
Pervasive computing environment and the Grid infrastructure can be combined to make the computation and information Grid truly ubiquitous. As an emerging field, pervasive grid has not had the opportunity to develop a architecture model similar to the OSI reference model used to describe computer networks. Such a model would be useful in properly classifying design issues and providing needed context...
Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, making the healthcare system more efficient, and helping to quickly react on emergency situations. Meeting the strict security needs of ubiquitous medical applications is a big challenge: safety and privacy of patient data has to be guaranteed all the way from the sensor nodes to the back-end...
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. They are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing...
We introduce the concept of cognitive wireless mesh network, named CogMesh, in order to meet the future needs of ubiquitous wireless communications. CogMesh is not a concept that simply applies cognitive functionalities into traditional wireless mesh networks. Instead, it aims to enable a uniform service platform by seamlessly integrating heterogenous wireless networks through the utilization of advanced...
The ubiquitous nature of wireless devices today, and the potential presence of 10 billion such devices over the next decade, has fueled the recent interest in their security properties in general, and in that of wireless networks, such as 802.11x. The problem is exacerbated by the fact that sophisticated members of BLACKHAT communities can potentially compromise all 10 billion of these devices. Once...
In recent years, short-range wireless communication becomes a hotspot in wireless industry, which can be widely used in constructing the wireless sensor network of military, industrial control, precise agriculture and medical monitoring. It will play an important role with the coming ubiquitous computing age. Focusing on LR-WPAN 802.15.4, this paper introduces its security architecture and presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.