The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
This paper depicts the current situation of the development of the Internet of Things(IoT). RFID system is vulnerable to various attacks, because there is no physical or visible contact in its communication process. The research on security and privacy domain also increasingly causes the attention of academia. And this paper is mainly underlined that security and privacy issues exist ubiquitously,...
Recently, as smartphone is becoming more and more popular, concern about security threats against Mobile Communication Device (MCD) is getting higher. The MCD can not only become the target of the cyber attacks, but also be used as the tool of the cyber attacks. This paper proposes a context-based remote security control scheme for MCD. The proposed scheme consists of two systems: Context-based Mobile...
This talk will consist in an overview about the majore search projects related to wireless multimedia, context aware computing and wireless ad hoc and sensor networks, distributed and collaborative virtual environment, which we are currently investigating at PARADISE Research Laboratory, uOttawa. Next, we shall focus upon the design of large-scale distributed and mobile system for critical conditions...
The next generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-of-service, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical handover. Y-Comm is a new architecture...
Mobile relay stations (RSs) provide broadband wireless access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security vulnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted...
The goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet, with the desired quality of service. In such an environment, it becomes very difficult for service providers to satisfy the needs of users. A solution is to assign a profile to each user in order to optimize and automate the dynamic service level negotiation. These mobile...
Recent research on remote health monitoring solutions has focused largely on developing context-dependent, streamprocessing capabilities on a personal mobile hub (typically, a cellphone) for energy-efficient transmission of data collected from a set of body-worn medical sensors. In this paper, we argue that commercial deployment of such pervasive wellness monitoring will require the extension of such...
The pervasive service interaction (PERCI) application allows interaction with Web services through associated real world objects equipped with contact less tags. The tags are read with a mobile. The read tag content is used to invoke Web service in the back-end system. The case study presented here is identifying in a structured approach security and privacy requirements of an near field communication...
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have been posed. One of the important challenges is to integrate quality of service (QoS), security and mobility support in heterogeneous networks. To facilitate the interworking of these mechanisms we propose...
Ubiquitous computing has drawn significant attention. Under this environment, there may consist of different networks such as WLANs, WPANs, Ad Hocs, and 3Gs, but with the help of mobile IP scheme, users are able to get services and resources from all kinds of networks at anytime and anywhere. However, when a mobile node (MN) moves to a foreign domain or roams around different domains, the authentication...
Summary form only given. The development situation of telecom services is firstly reviewed in this presentation. The evolution trends of network services with IP, broadband, streaming, P2P (peer to peer) and mobility features are described. The presentation introduces the evolution direction and prospect of networks technologies especially NGI (next generation Internet) and NGN (next generation network)...
Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental...
The increasing requirement for ubiquitous access of the users, enable the seamless support of different networks, with different technologies, and also with different types, such as moving networks and ad-hoc networks. This paper describes the ad-hoc network integration architecture being developed inside the IST project Daidalos II. The main purpose of this architecture is to seamlessly support the...
In ubiquitous computing environments access control decisions have to be adaptable to changes of the situation or state of an entity, in order to properly adjust to these changes without the need of manual interaction. A solution to this challenge is context-aware access control, where the mentioned changes are influencing access control decisions. In this paper we present a security framework for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.