The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID (radio-frequency identification) technology is widely used for supply chain management and inventory control. Furthermore, RFID has been recognized as a tool to realize a ubiquitous environment. The typical architecture of RFID applications comprises RFID tags, which are embedded in or attached to an object, an RFID reader, and IS (information services) server. The RFID reader reads the code...
We propose a vehicular network trust model that integrates cryptography-based entity trust and email-based social trust. The entity trust provides security protections such as origin integrity, data integrity, and confidentiality. The social trust provides a level of belief on the data transmitted by an entity. To achieve the email-based social trust, we require each user to run an automated agent...
Data privacy in vehicular ad hoc networks (VANETs) is a practical issue currently under investigation. Privacy-preserving anonymity authentication in networks is a challenging topic related to security, anonymity, network, and data privacy. Existing anonymity authentication in VANET is based on a k-anonymity model. An on board unit (OBU) chooses an adaptive anonymity group size in a request to an...
Privacy, authentication, confidentiality and non repudiation are the most desired security attributes for all vehicular ad hoc network (VANET) applications. A lot of solutions have been presented to address these issues. However, they are mostly dependent on centralized certificate architecture and some sort of hardware-based security. These solutions are expensive to carry out and lack the incentive...
The mobile radio frequency identification (MRFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission...
An important privacy issue in location based services (LBS) is to hide a user's identity and location while still providing quality location based services. A user's identity can be easily hidden through anonymous Web browsing services. However, a user's location can reveal a user's identity. For example, a user at home may want to ask queries such as ldquoFind the nearest hospital around merdquo...
Location based services like finding nearest restaurants or finding friends have increasingly became more common, especially to mobile users. Nevertheless, misuse of location information could represent some threats to users' privacy. Great effort has been placed to propose new techniques which try to deal with these threats, but in most of these cases, techniques were not tested in real environments...
Advances in wireless communication and embedded electronic systems have revolutionized everyday life via inter-networking sophisticated tiny and useful devices. Mobile RFID (mRFID) systems make it possible to get information about entities through portable devices including mobile handsets, PDAs, laptops, etc. RFID tags consist of secret information that can be accessed by an authorized mobile user...
Although some Extensible Authentication Protocol (EAP) methods such as EAP-TTLS (Tunneled Transport Layer Security) can hide true identity to protect the privacy of the mobile user, they cannot identify the mobile user for accounting and authorization purposes. The EAP framework lacks a mechanism to manage the relationship between true identities and pseudo identities. This study proposes an identity...
Research shows that location based routing can improve the performance and efficiency of communication in mobile ad hoc networks. From another point of view, disclosure of location information can cause a serious privacy risk, especially in environments where different groups of nodes cannot fully trust each other. In this paper, we propose a protocol through which a wireless node can achieve configurable...
Ubiquitous computing has drawn significant attention. Under this environment, there may consist of different networks such as WLANs, WPANs, Ad Hocs, and 3Gs, but with the help of mobile IP scheme, users are able to get services and resources from all kinds of networks at anytime and anywhere. However, when a mobile node (MN) moves to a foreign domain or roams around different domains, the authentication...
In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache...
Several methods have been proposed to support location-based services without revealing mobile users' privacy information. There are two types of privacy concerns in location-based services: location privacy and query privacy. Existing work, based on location k-anonymity, mainly focused on location privacy and are insufficient to protect query privacy. In particular, due to lack of semantics, location...
Network operators gradually open their interfaces to formerly hidden services which fosters the development of a new class of mobile applications that take into account context information such as the users location. However, this development also raises problems. Especially the lack of protection of privacy in location-based services. In this work we propose a service architecture that is aimed at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.