The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application...
The following topics are dealt with: decision making; electromagnetic fields; electromagnetic waves; information technology; cyberspace; network theory; optical & access networks; ICT security; and wireless & mobile & satellite communications.
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
The following topics are dealt with: homeland defense; alternative energy sources; green building technologies; mobile communications; microwave technology; electromagnetic compatibility; mobile ad hoc networking; network security; sensor fusion; antenna systems and processing; radio locationing; radar systems and techniques; and medical electronics.
Transmission networks, is the basic network for all types of telecommunication business and is being constructed on a large scale. How to effectively and fully utilize the network resources becomes the great concern in network construction and maintenance. Meanwhile, the transmission operators also put their emphasis on how to build the transmission networks with clearer network organization, richer...
Wireless network is one of the 2010s most important security issues. As smartphone(android) is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP have not being managed properly in terms of security, Wireless Internet users also dont recognize important of security. This situation causes grave security threats. This paper...
Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely adopted especially by young adults. However, Bluetooth-enabled networks have similar security weaknesses as any other digital networks. Instilling security awareness and implementing preventive measures, responsibilities of both the device manufacturers...
With the construction of 3G networks and the development of mobile internet, mobile service is updating quickly. Meanwhile, the mobile phone viruses became the next target. Mobile phone viruses are a destructive procedure, just like the computer virus (program), which is also infectious and destructive. This will constraint the development of the smart mobile phones. The study of the characteristics...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
We propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Our approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Our basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known...
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
In this paper we develop a generic hierarchical model for performance analysis of intrusion detection techniques as applied to a cyber-physical system (CPS) consisting of mobile nodes with navigation, manipulation, sensing and actuating capability. We develop two intrusion detection techniques, namely, positional discontinuity and enviroconsistency, for intrusion detection of malicious attackers in...
The Controlled Randomness Protocol (CRP) for management of cryptographic keys is a method to improve the security level of secure communication protocols. We assess the performance of the CRP when implemented on embedded systems running the .NET Compact Framework. We present our findings from two different platforms: one smartphone running .NET Compact Framework 3.5 and one smartphone running .NET...
This paper presents a novel NIDS evasion strategy that allows attackers to exploit network mobility to perform attacks undetectable by modern NIDSs. Mobility-based NIDS evasion works by combining traditional evasion techniques and node mobility. It represents a generally applicable evasion strategy that works on several protocols for node mobility, and it is effective against state-of-the- art and...
In this paper, we propose a flexible access control mechanism, which integrates domain information and confidence values, for mobile commerce. When user requests an access to the data server, the data server fetches and returns results according to the user's access right. Algorithms demonstrate the flexible access control is effective and flexible.
This paper proposes an authentication scheme for consumer electronic devices such as smart phones, PMPs, PDAs, and laptops accessing mobile IPTV service from home network. Security requirements such as content protection, service protection, handover authentication, and confidentiality are required to provide secure IPTV services. The CAS or DRM widely used for IPTV services in a wired network has...
Geospatially-aware mobile devices and applications (GAMODAs) are increasingly penetrating both business and consumer markets. One of the primary concerns with GAMODAs is the new dimension of information privacy risk associated with users' location data. However, because this technology is relatively new, it is possible that much of this concern can be explained by the user's knowledge (or lack thereof)...
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.