The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Mobility traces have been widely used in the design and evaluation of mobile networks. To mitigate the privacy threat of publishing mobility traces, the traces are often anonymized and obfuscated. However, even with anonymization and obfuscation techniques, traces can still be deanonymized by exploiting some side information such as users' co-location. With online social networks, mobile users increasingly...
5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing...
Computer network and security courses are essential parts of college computer science curriculum, and hands-on networking experience is well recognized as an effective approach to help students better understand the concepts of network and security. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up...
This paper puts forward a new trust model CTM (Credit Transfer Model) in the mobile P2P (Peer to Peer) network. Applying a hybrid P2P network topology structure, the CTM selects large servers in the cable network as super nodes which maintain the identity information, resource information, transaction records and trust information of ordinary nodes. The CTM simplifies the calculation of the node's...
This paper presents an advanced Security QoS provisioning module with vertical multi-homing and multi-streaming framework for 5G mobile terminals with radio network aggregation capability in next generation mobile and wireless broadband networks. The proposed mobile terminal framework is leading to high performance opportunities for multimedia services with high level of QoS provisioning and secure...
Facilitated by the emerging technologies of cloud computing, vehicular cloud computing (VCC) is being expected to be a new paradigm to create a new situation for vehicular data services. However, with the increasing popularity of vehicular cloud services, accessing vehicular terminals and produced mobile data are experiencing tremendous growth, therefore, how to provide enough capacity for all access...
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
This paper describes the status of the 5G NORMA architecture after the second design iteration. It integrates the control and data layer functions developed in the project into a harmonized mobile network architecture, applying the paradigms of adaptive (de-) composition and allocation of network functions (NFs), programmable network control, and end-to-end network slicing. The paper depicts the design...
Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP...
Software Defined Network (SDN) is an advanced approach to designing dynamic, manageable, cost-effective, and adaptable network architectures. SDN will play a key role as an enabler for 5G and future networks. Transferring network monitoring functions to a software entity working in conjunction with configurable hardware accelerators through a scheme called Software Defined Monitoring (SDM) is one...
A case study is presented that empirically analyzes the use of known unsafe functions in gcc, a well-known general purpose software system, along with their distribution over a 5-year period from, 2012 through 2016. The 5-year history of gcc studied is comprised of a total of over 26 million lines of code. gcc was statically analyzed with the use of srcML and a tool created by one of the authors....
This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
We propose a novel IoT directory service for storing, updating, and providing records of mobile IoT devices or objects. The IoT directory service is designed to manage a massive number of records (about one billion) and support fast lookup (latency of less than 10ms). It performs proactive caching of the records in various replicas (following the movement of mobile IoT devices or application clients)...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
This paper investigates and analyses the insufficient protections afforded to mobile identities when using today's operator backed WiFi services. Specifically we detail a range of attacks, on a set of widely deployed authentication protocols, that enable a malicious user to obtain and track a user's International Mobile Subscriber Identity (IMSI) over WiFi. These attacks are possible due to a lack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.