The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-based services (LBS) are available on a variety of mobile platforms like cellphones, PDA''s, etc. and an increasing number of users subscribe to and use these services. One of the basic privacy issues with LBS is that a user may not necessarily want to disclose their own location whenever they inquire about the location of places of interest to them e.g., nearest gas station, restaurant etc...
Within a mobile environment, communications may necessitate different security properties depending on the sensitivity of the data exchanged. A protocol such as HTTPS that uses the Secure Socket Layer/Transport Layer Security (SSL/TLS) may offer these properties, but it is known that SSL/TLS is high-energy consuming and the properties are provided as a block, which may have an important impact on...
Services provided across 4G networks are mainly characterized by ubiquity and convergence. Thus, a user needs to be identified and authenticated to different serving networks and service providers. The definition of different identities for the same user would be hardly manageable since it would introduce identity confusion and heavy management procedures, especially in the overlapping zones. Therefore,...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
The tremendous growth in mobile and wireless communications comes with more pervasive applications. Current mobile device platform does not allow a local or remote user to attest the target platform. The limitation of using existing software-based protection alone can be easily affected by malicious codes and it cannot assure its own integrity. In this paper, we explore a new approach of anonymity...
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
In Unattended Wireless Sensor Networks, data are stored locally and wait for a sink to offload. Since there is no real time communication between the sensors and the sink, a powerful mobile adversary can corrupt the collected data between the sink visits. In this paper, we propose simple and effective algorithms to limit data corruption in homogeneous unattended wireless sensor networks, without implementing...
A logical key hierarchy (LKH) based key management approach is the most common way to manage a group key with less rekeying overhead. However, the LKH approach causes inefficiency of rekeying the group key in mobile cellular networks since it does not consider the characteristics of the networks, such as the cell-based network topology and the user's mobility. This paper proposes an efficient and...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Authentication is an important component to protect information systems from unauthorised access of malicious sources. Because of resource limitations of mobile devices, it is a challenge to apply current authentication methods in wired networks for wireless networks. It lacks any considerations of security, efficiency, scalability and flexibility in wireless networks. In this paper, an authentication...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
Two important challenges in the wide deployment of location-based services (LBSs) are privacy and confidentiality. Existing privacy-enhancing techniques rely on encryption to safeguard communication channels, and on pseudonyms to protect user identities, or rely on a well-established k-anonymity area without characters to compute exact answers for range and nearest neighbor search without revealing...
Wildcard identity-based encryption (IBE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based...
The rapid increase in using mobile communication networks for transmitting confidential data and conducting commercial transactions such as mobile e-commerce is creating large demands in designing secure mobile business systems. However, the mobile devices and mobile communication network have some weakness. It can cause some problems using traditional VPN technologies in mobile computing environments...
This paper addresses one the security problems of mobile ad-hoc network: the P2P dynamic secure group key establishment. In the paper we are proposing a new efficient P2P hierarchal group key management protocol for ad-hoc networks. The paper introduces a two level hierarchical structure and a new scheme of group key update.
Wireless mobile communication imposes certain security risks due its underlying medium - airwave; in spite of its popularity. Different authentication protocols have been devised to strengthen the security for wireless communication. The authentication and key agreement (AKA) adapted by 3G networks is one of the widely appreciated protocols. However, even such protocol is vulnerable to threats like...
Considering the growth of wireless communication and mobile positioning technologies, location-based services (LBSs) have been generating increasing research interest in recent years. One of the critical issues for the deployment of LBS applications is how to reconcile their quality of service with privacy concerns. Location privacy based on k-anonymity is a very common way to hide the real locations...
Many location-based services for alerting persons of nearby friends have been deployed in practice. A drawback of most approaches to providing such services is that friends always learn each other's location even when they are not actually nearby. The Louis protocol proposed by Zhong, Goldberg and Hengartner aims to ensure that a friend's location is revealed to another friend if and only if the friends...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then, its security was analyzed from the angle of technical realization and formal analysis to verify whether the original...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.