The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
Computer network and security courses are essential parts of college computer science curriculum, and hands-on networking experience is well recognized as an effective approach to help students better understand the concepts of network and security. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up...
Smartphones and other mobile platforms provide a low cost and easily accessible method of monitoring patient health, and aid healthcare professionals in early detection of disease. Immediate access to the gathered data is an essential factor in effective patient care. But the current processes used for patients' vital data collection is slow and error prone. This undermines the advantages of remote...
Water treatment is one of those essential elements of modern life that is taken for granted by the general population. In this poster, we describe the ability to remotely understand and improve water chemistry using controllers attached to the cloud.
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
Mobility is a major problem in urban centers and vehicular networks have been a focus of study in the attempt to create applications focused on intelligent transport systems (ITS). With that in mind, ITS initiatives act as a possible solution to improve the functioning and performance of traffic systems, reducing congestion and increasing security for citizens. In this way, the present work presents...
With the development of technology, smart phones and tablets had begun to integrate into the people's working, in order to protect the development of enterprisesmobile device management has become an essential part of the enterprise. This study designs and implements an enterprise mobile device management system that based on AOSP (Android Open Source Project) and SELinux, by analyzing the control...
Mobile Crowdsensing is often used for involving large number of persons in distributed sensing experiments. In some cases, (e.g., online games, online sensing of sensitive data, etc.) privacy and security issues arise. Peer-to-peer networks can be effectively used to guarantee anonymity and solve the above mentioned issues. In this scenario, we describe an experiment of browser-based peer-to-peer...
This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.
We propose a novel IoT directory service for storing, updating, and providing records of mobile IoT devices or objects. The IoT directory service is designed to manage a massive number of records (about one billion) and support fast lookup (latency of less than 10ms). It performs proactive caching of the records in various replicas (following the movement of mobile IoT devices or application clients)...
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
With the today's the rapid developing of wireless mobile networks, various types of mobile devices have emerged and a variety of applications have been developed. People's desire for more convenient life and more efficient collaboration may be coming true in this era. Meanwhile there are lots of security challenges in wireless mobile networks. To resist conventional attacks and obtain stronger securities...
Despite many applications, mobile cloud computinginduces privacy concerns. In particular, when mobile device usersoffload the computation of a mobile app to the cloud, they may notwant the cloud service provider (CSP) to know what kind of appthey are using, since that information might be used to infer theirpersonal activities and living habits. One possible way for the CSPto learn the type of an...
Location-based services can be seen everywhere today in our smartphones and devices that use GPS, and this service has become invaluable to customers. LBSs, however, do have their flaws. Users are forced to reveal location data if they want to use the service, which can be a risk for their own privacy and security. Therefore, several techniques have been proposed in literature in order to provide...
Offloading has emerged as a promising idea to allow resource-constrained mobile devices to access intensive applications, without performance or energy costs, by leveraging external computing resources. This could be particularly useful in enterprise contexts where running line-of-business applications on mobile devices can enhance enterprise operations. However, we must address three practical roadblocks...
Location-Based Services (LBS) is used to identify the current location of the user and the user is able to search the point of interest such as hotels, parks which is located near to him. Many of the systems are still using GPS to search any location which does not have privacy. The systems which are proposed earlier have some drawbacks on privacy. The proposed system provides privacy by using Dynamic...
Android inherited its core security from the Linux operating system where applications run with different unique system identities. Another level of security based on “permission” model is present in Android, for controlling the accessibility of resources and operations that a given process can execute. Applications with no explicit permission request should not be able to influence the user experience...
It is standard practice in enterprises to analyze large amounts of logs to detect software failures and malicious behaviors. Mobile applications pose a major challenge to centralized monitoring as network and storage limitations prevent fine-grained logs to be stored and transferred for off-line analysis. In this paper we introduce EMMA, a framework for automatic anomaly detection that enables security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.