The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly...
Mobile computing proved to be essential in today's cyber communications. However, entities in mobile computing are known of having limited energy, physical, and logical resources. This imposes various challenges that greatly affect communication quality and performance of those mobile entities, especially when applying computationally-intensive security measures that are essential for protecting the...
The Home Subscriber Server (HSS) within the packet core of the Long Term Evolution (LTE) is a key node leveraged for essential operations, such as mutual authentication and access control. This centralized node is essential for the overall network operation as it is the cornerstone of the cryptographic functions executed in a mobile network. It stores several parameters for each subscriber, including...
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which breaks the static correspondence between TEID...
With the growing popularity of Android platform, Android application market becomes a major distribution center where Android users download apps. Unlike most of the PC apps, Android apps manipulates personal information such as contract and SMS messages, and leakage of such information may cause great loss to the Android users. Thus, detecting information leakage on Android is in urgent need. However,...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. To achieve this goal, one of the problems is how to continuously monitor/capture and interpret the...
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
Ambient networks aim to provide a unified networking concept that can adapt to the very heterogeneous environment of different radio technologies and service and network environments. One of the important issues in the ambient network is to aware complex contexts in various environments. This complex context is determined by a surrounding environments or variety of situations. Office is one of the...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust...
Nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets to enable communication between other nodes that are not in radio range with each other. However, whether for selfish or malicious reasons, a node may fail to cooperate during the network operations or even attempt to disturb them, both of which have been recognized as misbehaviors. Various trust management schemes have been...
Middleware has been extensively used in mobile devices to abstract issues raised by mobility, such as resource constraints, intermittent connectivity and platform variability. In such a sense, several proposals that explore mobile middleware concerns can be identified in the literature. However, in general, most of them deal with specific aspects of mobility (e.g. distribution, context, adaptation),...
In the near future, the trend of user-generated content and services currently observable in the Internet domain will also affect the mobile environment: mobile users will become able to easily create content and small services while on the move and offer them to social communities. Mobile users will no longer be pure consumers, they will also become producers and providers of mobile content and services...
Understanding and discussing the security aspects of IT systems during their development is challenging for both domain specialists and IT experts - neglecting this aspect leads to communication problems and, eventually, to less secure systems. An important factor for these challenges is the distribution and variety of basic IT security concepts, attacks, and countermeasures, e.g., in the standard...
A common challenge for applications requiring information and knowledge fusion is the conversion of data streams into knowledge adapted to the context of usage. In the context of the project Integrated Mobile Security Kit, this paper focuses on the knowledge fusion sub-system. It integrates different fusion aspects based on a common domain model and embedded into a distributed and mobile infrastructure...
There are several radio access technologies providing connectivity for mobile devices. In the future, more and more mobile devices will be capable of supporting more than one access technology. For being able to use these technologies simultaneously, there is a need for multihoming capabilities. Due to the variety of access technologies and the ability to use them simultaneously, new concepts for...
A mobile communication device is a small size of portable computer which provides communication service. One of the biggest barriers in developing the mobile communication device is security. To protect itself against security threats, the mobile communication device need to be loaded with various kinds of security functions such as firewall, access control, and so on. However because the mobile communication...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
Mobility is an emerging area that comes up with several technologies and stakeholders. Dealing with the security requirement for mobile applications means acquiring all the knowledge and the available technologies for the design and deployment of a reliable and usable countermeasure. Not only the field lacks of standards but also requires several quality constraints. To assist developers to face such...
With appearance of mobile devices such as cell phones, PDAs and smart phones, context-aware applications are becoming increasingly popular. Therefore, developers are always seeking for new and powerful developing tools for context-aware programming. Developers prefer to use fast and convenient development tools that can support all required possibilities for implementing a complete and user-friendly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.