The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy of mobile users is a theme of primary importance, given the widespread and growing use of connected smartphones, the great amount of personal data that can leak, and the lack of proper controlled environments in the current mobile scenario (for instance, mobile apps and their handling of permissions). In this paper we focus on a crucial part of this scenario: usage of mobile phone...
This paper investigates a dynamic bandwidth allocation strategy with secrecy constraints, where big data can be viewed as a resource instead of a burden from the traditional perspective. Unlike usual cases, we take into account big data and security issues along with bandwidth allocation. It is reasonable to assume that big data derived from mobile network, by a series of processing, can generate...
The Paper describes certain Novel Technologies and Security concepts that have been successfully developed in Saudi Arabia through Privately funded Research & Development. These include various Wireless Video based Security & Surveillance and Robotic Systems and other Integrated Security Concepts that are very relevant in the current environment. The paper discusses and highlights several...
Base on the current situation of the development of wireless medical, according to the multi-frequency and broadband MIMO road medical special wireless network system (WIDS) safe use problem, the WIDS themselves security, stability and continuity of network transmission, wireless network impact on human health and the medical equipment is discussed and studied. Based on the research of the system...
We consider a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via mobile network to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators (MNOs), each...
Many location-based services require a mobile user to continuously prove his location. In absence of a secure mechanism, malicious users may lie about their locations to get these services. Mobility trace, a sequence of past mobility points, provides evidence for the user's locations. In this paper, we propose a Continuous Location Integrity and Provenance (CLIP) Scheme to provide authentication for...
We study security in partial repair in wireless caching networks where parts of the stored packets in the caching nodes are susceptible to be erased. Let us denote a caching node that has lost parts of its stored packets as a sick caching node and a caching node that has not lost any packet as a healthy caching node. In partial repair, a set of caching nodes (among sick and healthy caching nodes)...
In this study, we present a lightweight context-aware security system for wireless Internet access. Our system consists of an Android mobile application and a web browser plug-in called G&ALF. Android application is used to retrieve the public configuration parameters of available wireless connections, evaluate the context and assess the security level of the wireless network. Then, the assessment...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we propose a new CAC scheme which considers for acceptance decision except other parameters also the security...
In this paper, we implement an Open Flow based fully functional 802.1X access network and an IP based cognitive access network which are interconnected as edge networks to our SDN core. We realize seamless mobility in the WLAN domain and mobility between WLAN and Cognitive networks for the clients with dual band support. The pre-installed flows on the backbone aggregate traffic from access networks...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we propose a new CAC scheme which considers for acceptance decision except other parameters also the security...
Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability...
This paper proposes the scheme to detect the Mobile AP from mobile devices independently without the help of additional nodes. The proposed scheme is for detecting the Mobile AP that does not have any security configuration which is highly likely to occur as the Rogue AP in real wireless network environment. The device inspects the NAT Behavior and Open Port at the time of specific AP connection to...
We innovatively propose a honeypot monitoring system for mobile communication to decrease the possibility of smart phones being attacked by viruses. The system applies the idea of active honeypot theory and combines with communication protection. We initially clarify the high safety protection performance of our honeypot monitoring system in the following steps: we simulates the wireless access environment...
Over the last couple of decades, the trends in network protocols and the layering principles have witnessed deviations from the standard 7-layer OSI model or the 5-layer TCP/IP model. These deviations were necessary to improve network performance, in terms of service quality offered to the increasing numbers in users and their demands and coping with emerging software and hardware technologies among...
Use of wireless hand held devices like mobile, PDA, laptop etc. is increasing rapidly. Many advanced users want more functionality with these wireless devices to manage their daily schedule. But most of the wireless hand-held devices have limited resource capability for robust functionality. Therefore cloud computing environment could be an alternative solution for these devices to support resource...
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. IIn this paper we present Mobile Secure...
Because of their built-in cameras, microphones, speakers and mobile capabilities, all of which can be controlled remotely, mobile Wi-Fi robot toys can pose a risk to families with children when used remotely, an attribute that can be exploited by online pedophiles who want to exploit young children online. First, this paper provides a brief background on online pedophiles. Second, it presents the...
Security in mobile wireless sensor networks is challenging to achieve, as mobile wireless sensor networks have many different characteristics from wired networks such as lack of center infrastructure, vulnerable wireless links and rapid changes in topologies, etc. However, earlier studies on security issues mainly aim at utilizing cryptography and authentication, which are not only constrained by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.