The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Involving smartphone users in the smart transportation system is growing in this digital era. To encourage people to use public transportation, we develop a mobile application through gamification technique to support user involvement on public transportation in Indonesia. The system is called Bandung Smart Transportation Systems (BSTS), and reward system is adopted to give users more benefits. The...
The use of location based authentication services has seen a sudden boom with the reduced cost of GPS hardware and small size-factors. However, the drawbacks associated with the GPS related services makes it infeasible to incorporate GPS in all the mobile nodes (MN) and subject to availability of GPS signals. This demands for alternatives that can be used directly or indirectly in place of GPS for...
The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based...
When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. We propose to deploy a mobile OpenBTS along with...
Lots of web accounts are being hacked everyday even though the public web servers like Gmail, Yahoo and Hotmail deploy the best-known security mechanisms. However, attacks usually happen due to personal faults. It is too difficult to hack the Gmail or Yahoo servers, but usually attackers try to gain access to user's system itself to get some information about his password. In this paper a new mechanism...
Providers of location-based services seek new methods to authenticate the location of their clients. We propose a novel infrastructure-based solution that provides spontaneous and transaction-oriented mobile device location authentication via an integrated 802.11× wireless access point and 3G femtocell access system. By simply making a voice call while remotely monitoring femtocell activity, a calling...
We have developed a geographical location estimation system for WiFi user in campus to help network administration. We use WiFi radio wave to estimate users'location. The system measures strength of radio wave between WiFi access point and a user's PC. We have developed and implemented calculation formulas. The system calculates distance between the pair for the estimation. Then the system shows the...
This paper proposed a personal authentication system using small resources for home use. The following three goals were achieved at the same time by this system: (1) identification of each individual, (2) unique existence of each individual in the specified time and space, and (3) no contradiction in the existence of each individual in view of the space and the time before and after an event. Considering...
In this paper, new space-time authentication techniques are proposed. Location-based authentication is a new direction in development of authentication techniques. At the first part advantages of location-based authentication are introduced. In the second chapter the main aspects of using user's position information are discussed, as user's mobility and user's privacy. The main part of the paper is...
Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. Despite the evaluation and acceptance of many authentication protocols, online communications remain insecure, we propose to add the...
Online communication offers organizations greater efficiency. However, online processes increase the threat level during message transfer. This necessitates researchers to develop and improve security protocols in order to enhance the security of communication lines. There are many evaluation tools such as BAN Logic to evaluate how secure authentication protocols' messages are. Despite the evaluation...
The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we...
Ad hoc networking is considered as an inexpensive solution for easy and fast wireless network coverage. However, for real service deployment, security and availability in such networks are still under research even though some experimentation has shown its viability. Additionally, peer-to-peer (P2P) networking has emerged as a key technology to enable resource sharing among users. As a result, the...
Geotagging, in which digital photos are labelled with the location where they were taken, becomes more popular today. Users can browse the photos on digital map and make the Web photo sharing and management even more conveniently. However, lacking the function of authentication and the way to deal with the situation that information within the EXIF area being falsified, the content of the photo might...
Mobile technology provides many benefits to education. In this paper we describe the architecture of a system that allows people to search and retrieve information about its location and activities in a campus, knowing about the resources available on its surroundings, including buildings, classes, events and people.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.