The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the challenges of Machine-to-Machine (M2M) communications architecture development and trends in the development of M2M architecture in the Telecommunications Industry Association and the European Telecommunications Standards Institute. Included is information regarding protocol stacks, high-level architecture and functional architecture. A discussion of the development of architectures...
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. The two attack model can be prevented by ensuring that cloaking regions satisfy ksharing property or l-diversity property, however, when the overall POI (point of interests)distribution...
Voting process in today's era is behind its time as it relates to the involvement of technology. The voting process is been fully manual and paper based. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were developed to resolve some of these issues like Electronic based voting that is been actively used...
There are clear advantages in using remote monitoring systems for elderly care. They help with improving the efficiency in providing higher quality of care. These systems collect relevant data and transmit them to the healthcare provider, to be stored on their servers in the form of patients' Electronic Health Records (EHRs). The EHR may then be used by healthcare professional, either at provider...
This paper presents a detailed architecture and a token-based protocol for the trust delegation on medical data across a public mobile network. The trust is negotiated between a mobile emergency medical unit and a medical record database. The solution presented in this paper enables the development of a software tool that can be used by the emergency medical units in urgent need of sensitive personal...
In a multi-organization environment like the GRID, each institute might want to apply some boundaries on how its resources are being utlized by other institutes. A disagreement between the multi-Virtual Organizations (VOs) might happen in the security aspect for the policy framework. Mobile Grid Services has given the ability to move jobs, data and application software from nodes to nodes during jobs...
A solution to use removable storage medium safely is put forward based on the study about trusted computing theory. This solution manages removable media through C/S model, registers mobile storage media used by user in the server, assigns a unique authorization number to authorize it can be used in trusted region; The client consists of the application and driver, the application is used to authorize...
Mobile Agent technology mixs the technology of software system, communication system and distributed system together. The tasks are caught out through the automatic movement and running on the Internet so that most of the interbahavior can be made locally. In another word, mobile Agent transfers the disposal to the data side to handle it locally. Therefore,the research of mobile Agent has become a...
With widespread deployment of multicast over Wireless Local Area Networks (WLANs), several issues including fixed data rate transmission, multicast key distribution security, and overlapped multicast address have to be addressed for accommodating an efficient multicast scheme for WLANs. The latter problem can be addressed by utilizing Internet Protocol version 6 (IPv6) which provides significantly...
Because of the rapid growth in e-commerce, we can buy things walking around. Its not the expensive items, but the small and cheap items such as text files, music files, movies that we buy while walking around. As this kind of e-commerce grows, micro-payment system develop these days. Since its so convenient, and simple, more and more people use it. Despite its merit, it has some problems to be solved...
An established way to analyze shoppers' behavior at the point of sale consists of identifying their paths through the store as well as their approach behavior towards different shelves. Such proceeding allows e.g. for optimizing product placements or in-store advertising and guidance. Since there is a technological challenge in doing this inside the respective locations, there is a need for better...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password...
Mobile devices with two network interfaces(WiFi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultra wideband. Hence we must assume that such devices will be multi-homed by default. For various reasons, including...
While many solutions for making backups and restoring data are known for servers and desktops, mobile devices pose several challenges, mainly due to the plethora of devices, vendors, operating systems and versions available in the mobile market. In this paper, we introduce a new backup and restore approach for mobile devices, which helps to reduce the effort in saving and restoring personal data....
In this paper, we propose a Seamless and Secure service Framework (SSF) which guarantees secure association between user's terminal and safety critical system such as payment gateway by exploiting both user information and network information. Despite the leaks of personal sensitive information, SSF provides very safe service environment in wired and wireless convergence network that vertical handover...
Key management for multicast and broadcast services has been the subject of extensive research for more than 10 years. Difficulty to find an appropriate security mechanism lies in the fact that a very high number of users consume streamed protected contents simultaneously. 3GPP, IEEE and ETSI security experts have developed various Key Management Schemes (KMS) that focus on the reduction of transmission...
Mobile IPv6 has been developed for quite a few years now, but it has yet to bring its constant connectivity and global reachability benefits to mobile devices in real world scenarios, mainly due to lack of trouble-free and secure network access and data transmission for devices as they roam. In this paper we propose a Unified Architecture that combines the strengths of Mobile IPv6 and AAA services...
This paper presents a mobile middleware that solves interoperability problems occurred in VoIP protocols (SIP, H.323, Jingle and their different vendor implementations) and uses distributed shared objects to overcome scarce resource problem of mobile devices.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.