The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steppy is an Android-based application which is used for calculating the number of footsteps. The Steppy data is stored in the database and is shown on the Shesop website. When Personal Health Record (PHR) features on the website, privacy becomes vulnerable to various attacks so it needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed...
With the expanding application of the two-dimensional barcode, the harmfulness of malicious URLs is much more serious. For preventing malicious URLs of two-dimensional barcode, this paper proposes a detection method -- H-SBH which is utilizing hash function. Firstly, the detection system extracts eigenvalues of malicious and benign URLs by H-SBH, then builds black and white lists library based on...
Mobile Marketing is a powerful means to grow business. Tremendous increase in the count of mobile users has motivated the mobile marketing to high level in the last several years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted major attention of mobile users and the businessman now a days. Signal Processing is used to get latitude and longitude of...
This demonstration shows the mobile payment platform based on cloud services, designed by the SIMulation project. This project is a joint research effort from a major French mobile operator and an academic research institute. NFC payments cards are hosted in RACS payment servers. These are remotely used thanks to internet enable smart phones acting as logical bridge between the merchant terminal and...
Android inherited its core security from the Linux operating system where applications run with different unique system identities. Another level of security based on “permission” model is present in Android, for controlling the accessibility of resources and operations that a given process can execute. Applications with no explicit permission request should not be able to influence the user experience...
Device-to-Device (D2D) communication constitutes an emerging network paradigm that promises to unlock decisive capacity gains without the need for expensive cellular resources. However, while deployment of this promising enabler technology in 5G-grade mobile networks is currently underway, the complete understanding of feasible use cases and their respective limitations has not yet been provided in...
Smartphones are increasingly used worldwide and are now an essential tool for our everyday tasks. These tasks are supported by smartphone applications (apps) which commonly rely on network communication to provide a certain utility such as online banking. From a security and privacy point of view a properly secured (encrypted) communication channel is important in order to protect sensitive information...
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about...
Mobile Edge Computing (MEC) promises a paradigm shift in enabling efficient Mobile Cloud Computing (MCC) services by providing storage and processing capacity within the access range of the mobile devices. In MEC, Mobile Edge (ME) servers are placed at the edge of the mobile networks eliminating the need to offload compute-/storage-intensive tasks of the mobile devices to the core of the network (the...
This paper presents an innovative and open concept for secure mobile payments, based on payment applications hosted in the cloud. It details an experimental Android platform, and NFC payment experiments performed with this platform. All the platform components rely on open technologies, i.e. available in commercial devices or specified by IETF drafts. On the mobile side security is enforced by a dedicated...
Payment is a basic facility for citizen, required by numerous services in our everyday life. In this paper we present an innovative and open mobile payment infrastructure, targeting Mobile Networks Operators (MNOs) and relying on open protocols and technologies. The MobiSIM platform is based on the Host Card Emulation (HCE) facility introduced since the KitKat Android operating system. It uses secure...
Health checking framework is considered as present progressive methodology in cloud applications. It is useful in enhancing the social insurance administration in today's reality. It additionally represents a genuine danger on both customer's security and protected innovation of observing administration suppliers, which could stop the wide selection of versatile wellbeing innovation. This paper is...
The application can be widely used by people in the border to find the appropriate path to reach the destination. The notification will be sent to the border security forces which act as the server to all other devices that are operated by people in ships. The application will notify the information of where the devices are being located and intimate them about the issues that occur due to opponent...
The application of smart cards and its fraudulent manipulation by software, hardware or telecommunication appears to be a major concern. Security breaches of smart cards, hacking into the system and creating duplicates of the cards have to be rectified. In this paper we propose an approach to design a more secure two-level authentication process that uses the PIN number as the first level of authentication...
Among the Organized crime, Human trafficking hold third place where as the first and second or drug and weapon trade across the globe. Human trafficking is a shame on Humanity. As per the report of Human Rights commission of India over 40,000 children are reported missing every year of which 11000 are untraced [1][2]. Another statics report saying 80% of human trafficking is done for sexual exploitation...
This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is proposed to be used where in the user, after inserting...
In today's internet world, web browser security is an important issue. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, many mobile browsers are also furnished...
Mobile Cloud Computing (MCC) is an emerging technology which attempts to combine the storage and processing resources of cloud environment with the dynamicity and accessibility of mobile devices. Security, particularly authentication, is fast evolving as a focal area in mobile cloud computing research. This paper comprehensively surveys the various authentication mechanisms proposed so far for mobile...
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm...
The fourth generation (4G) network is new wireless technology that offers much advancement to the wireless market. In 4G, the forward key separation plays a vital role in handover process and it can be vulnerable due to the presence of rogue base stations. Periodically updating the root key stored in base stations reduces the consequence of the attacks. But, the selection of the best possible key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.