The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The connection-oriented nature of wireless access has been setting limitations to accessing Internet services. In particular, Internet access via public Wi-Fi infrastructure typically requires a subscription and a complicated authentication procedure that can hinder connection establishment, according to recent reports. In this respect, we present FreeSurf, an architecture for turning existing wireless...
This demo exemplifies the use of different wireless protocols, such as BLE and NFC, to manage and control multiple door locks. Each lock is able to transfer data to a router through a wireless protocol, MiWi™. The latter is connected trough an Ethernet network to a computer that manages the permissions for each lock, logging all the events.
In this paper, we implement an Open Flow based fully functional 802.1X access network and an IP based cognitive access network which are interconnected as edge networks to our SDN core. We realize seamless mobility in the WLAN domain and mobility between WLAN and Cognitive networks for the clients with dual band support. The pre-installed flows on the backbone aggregate traffic from access networks...
To securely access data center supporting the constraint of temporal and location-based services, access-control system requires more flexible definitions applying to Wireless Heterogeneous Networks (WHNs). To cope with the WHNs environment, we propose an Associated Temporal and Spatial Role-based Access Control (ATSRBAC) model. In this model, both temporal-period and spatial-location based entities...
Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These protocols are invariably complex and use extensive signaling on the wireless backhaul since they aim to be be efficient (minimal handover latency) without sacrificing robustness. However, the mobile user has little involvement...
Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable...
In this paper we demonstrate the potential of MobiSEC, a complete security architecture for wireless mesh networks (WMNs), that provides both access control for mesh users and routers as well as a key distribution scheme. MobiSEC has been implemented and integrated in MobiMESH, a WMN implementation that provides a complete framework for testing and analyzing the behavior of a mesh network in real-life...
This article discusses the agent-based wireless data center architecture. The system is devised by 6 parts, such as the GPRS communications services, the embedded Linux database server, the GSM modem, the core monitoring system, the B/S access control and the wireless router firewall and so on. They can be distributed in different servers or the same server. The system uses a distributed work model,...
The location information is critical for many location-aware applications and services. Recent efforts have resulted in a plethora of techniques to localize wireless devices. However, with the availability of the location information, privacy concerns are raised: by whom and when should the location information be accessed? In order to provide trusted access to the location information, in this work,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.