The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Internet; crowdsourcing; software engineering; cyber security; successive iterative decoding; correlated Rayleigh fading envelope; pseudorandom phase generation; nonuniform signal constellation; network coding; mobile Web service; mobile Web services; fault tolerant architecture; context aware approach; arabic language processing; smart grid; video techniques;...
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In order to circumvent the problem of security in IoT...
The following topics are dealt with: security; pervasive & ubiquitous computing; IPTV, video and mobility; network topology; wireless & 4G; WiMax; resilience & network planning; wireless protocols; network architectures and systems; virtualisation & scaling; self-adaptive network systems; distributed control algorithms; adaptive network control and; networked healthcare...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: ubiquitous and pervasive computing; wireless sensor networks; multimedia systems; P2P networks; Internet applications; distributed systems; ad hoc networks; security models; privacy models; parallel algorithms; and network protocols.
In his 1960 essay, Eugene Wigner raised the question of ”the unreasonable effectiveness of mathematics in natural sciences”. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security technologies? I sketch a conceptual landscape of security that may provide some answers, on the background...
This work proposes a Secure User Centric Attestation Service (SUCAS) protocol that incorporates user's action information with spatial-temporal information rendered from the location-based service to create action-spatial-temporal evidence. This evidence can be used as proof to protect the owner's right in times of need. The SUCAS protocol preserves user's privacy by granting control to the user while...
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification...
Ubiquitous Environments are characterised as a heterogeneous set of devices and diverse communication channels and protocols to support seamless or invisible interaction between users and the environment. Information is constantly varying and transiting different channels throughout its lifetime in a dynamic and unpredictable manner. These environments provide a significant and novel set of challenges...
It is important that the training time of the Support Vector Machine (SVM) is shortened and storage space requirement is reduced for high-speed and large-scale network. An intrusion detection method based on parallel SVM is proposed and a detection model system is constructed in this paper. First, original training dataset gained from network is divided into three subsets according to the network...
Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space. Consequently, several security and privacy issues are raised especially due to the wireless access used to get services and to the privacy aspect that could be involved. To securely deploy these services in multiple smart spaces, we propose a secured service...
Secure device pairing between mobile devices is a challenging task. The lack of a trusted authority and low computational power make it difficult for mobile devices to establish secure communication channels in ubiquitous computing environments. Solutions have been proposed using location limited channels to transmit secure pairing information that can be verified as originating from the intended...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
A real-time pervasive collaboration system enables people to work together on a certain task at anytime and from anyplace. Security is one of the primary concerns for these systems, when running over public networks. In particular, end-to-end security represents a crucial issue in pervasive collaboration environments due to the heterogeneity of the networks and devices used. In this paper, we explore...
Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new computing environment. In many pervasive applications, devices collaborate with others within a particular area (such as a room or a building)...
The following topics are dealt with: peer-to-peer computing; ubiquitous computing; security of data; mobile ad hoc computer; wireless sensor network; protocols; data mining; distance learning; ID based broadcast signcryption scheme; and service-oriented architecture.
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around distributed trust management. While such mechanisms are effective in specific environments, there is no generic framework for deploying and extending these mechanisms over a variety of pervasive systems. We present the design...
Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. Diversity of the available environments, however, sets requirements for the design processes so that the new architectures can offer a concise and secure usage experience. This cannot be answered in an off-hand fashion or as...
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. They are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing...
The ubiquitous nature of wireless devices today, and the potential presence of 10 billion such devices over the next decade, has fueled the recent interest in their security properties in general, and in that of wireless networks, such as 802.11x. The problem is exacerbated by the fact that sophisticated members of BLACKHAT communities can potentially compromise all 10 billion of these devices. Once...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.