The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Due to some security issues of varieties of mobile access technologies, we need a new supporting infrastructure that can be able to support more efficient and secure ways to authenticate users and devices arises. To meet this goal, in view of current security issues of mobile terminals, we analyzed the idea of trusted computing, describe the user authentication model of TCG(Trusted Computing Group)...
The recent proliferation of wireless devices extends the scope of mobile ad hoc networks (MANETs) applications beyond the military domain to include civil and commercial application scenarios. Since MANETs are composed of mobile terminals with limited resources, MANET security remains an unsolved and motivating challenge. Due to advantageous like in-frastructureless and spontaneous deployments, MANETs...
Proxy mobile IPV6 protocol is a network-based mobility management protocol. Mobile node does not need to participate in any PMIPv6 messages. A certificated-based authentication mechanism based on the public key infrastructure is proposed in this article. It can be used to protect and authenticate two proxy binding messages of PMIPv6. In addition, we use SVO formal logic to analysis the security of...
This work presents a new mechanism for securing mobile ad hoc domain. Some human immune features and properties have been motivated in an attempt to build a robust security system. New computational techniques have been developed based on the immune system concepts, seeking to solve several engineering problems; however, not all the previous approaches have a tangible contribution to the networking...
The world is poised for a fifth cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing. This technology will become an important aspect of how we react as enlightened citizens to increasingly pressing global issues.
A strong designated-verifier proxy signature scheme was proposed to protect the original signerpsilas interests. In this scheme, the verifier was designated by the original signer. The valid proxy signature generated by the proxy signer on behalf of the original signer can only be accepted by the designated verifier and no body else can be convinced about the proxy signaturespsila validity or invalidity...
Mobile ad hoc network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion...
A research on the related technology and implementation of IP phone based on WiFi network is discussed in this paper; it includes the net structure of the technology used in designing the terminal of IP phone. This technology is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. A WiFi enabled IP phone is used which is preinstalled...
Over the last three years, mobile handsets have evolved from voice based services to multimedia terminals that is gradually leading towards a new era of consumer entertainment, fostered by mobile communications and consumer networks. The need for mobile digital rights management solutions is thus intensified in order to safeguard mobile media content. Various types of content protection solutions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.