The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today authentication has become a major challenge in mobile cloud computing. Using a static password for authentication in cloud provider presents several security drawbacks: passwords can be forgotten, guessed, written down and stolen, eavesdropped or deliberately being told to other people. In this article, we propose a solution in order to improve authentication in mobile cloud computing and mainly...
The Home Subscriber Server (HSS) within the packet core of the Long Term Evolution (LTE) is a key node leveraged for essential operations, such as mutual authentication and access control. This centralized node is essential for the overall network operation as it is the cornerstone of the cryptographic functions executed in a mobile network. It stores several parameters for each subscriber, including...
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which breaks the static correspondence between TEID...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust...
Middleware has been extensively used in mobile devices to abstract issues raised by mobility, such as resource constraints, intermittent connectivity and platform variability. In such a sense, several proposals that explore mobile middleware concerns can be identified in the literature. However, in general, most of them deal with specific aspects of mobility (e.g. distribution, context, adaptation),...
In the near future, the trend of user-generated content and services currently observable in the Internet domain will also affect the mobile environment: mobile users will become able to easily create content and small services while on the move and offer them to social communities. Mobile users will no longer be pure consumers, they will also become producers and providers of mobile content and services...
A common challenge for applications requiring information and knowledge fusion is the conversion of data streams into knowledge adapted to the context of usage. In the context of the project Integrated Mobile Security Kit, this paper focuses on the knowledge fusion sub-system. It integrates different fusion aspects based on a common domain model and embedded into a distributed and mobile infrastructure...
There are several radio access technologies providing connectivity for mobile devices. In the future, more and more mobile devices will be capable of supporting more than one access technology. For being able to use these technologies simultaneously, there is a need for multihoming capabilities. Due to the variety of access technologies and the ability to use them simultaneously, new concepts for...
A mobile communication device is a small size of portable computer which provides communication service. One of the biggest barriers in developing the mobile communication device is security. To protect itself against security threats, the mobile communication device need to be loaded with various kinds of security functions such as firewall, access control, and so on. However because the mobile communication...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
Mobility is an emerging area that comes up with several technologies and stakeholders. Dealing with the security requirement for mobile applications means acquiring all the knowledge and the available technologies for the design and deployment of a reliable and usable countermeasure. Not only the field lacks of standards but also requires several quality constraints. To assist developers to face such...
With appearance of mobile devices such as cell phones, PDAs and smart phones, context-aware applications are becoming increasingly popular. Therefore, developers are always seeking for new and powerful developing tools for context-aware programming. Developers prefer to use fast and convenient development tools that can support all required possibilities for implementing a complete and user-friendly...
The combination of SIP-NEMO and IMS brings benefits of power saving, low complexity and few handoff to both end users and service providers. In this article we investigate the integration of SIP-NEMO in the IMS, and propose two interworking architectures: loosely coupled and tightly coupled. We also present three basic scenarios: registration, session establishment and optimized handoff with context...
Advances in wireless networks, sensors, and portable devices offer unique chances to deliver novel anytime anywhere medical services and information, thus enabling a wide range of healthcare applications, from mobile telemedicine to remote patient monitoring, from location-based medical services to emergency response. Mobile e-health has great potential to extend enterprise hospital services beyond...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.