The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a novel remote user authentication scheme based on the geometric property of the Euclidean plane for wireless networks. We combine a user's biometrics information with a password to enhance the level of the security. We demonstrate that the proposed scheme satisfies the following security properties: anonymity, resistance to forgery attacks and replay attacks, fast error...
Currently the most popular secure protocol is SSL (Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI (Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL protocol,...
Potential safety and non safety applications of vehicular network provide solutions to current traffic system. Dynamic topology of the vehicular communication network and high speed of the vehicles make it a challenging task of authenticating the users. Researchers have proposed different types of authentication mechanisms for secure vehicular communication. We propose a new and practical card-based...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
The 802.11 Wireless Standard defines methods for improving reliability and security on Wireless Local Area Networks (WLANs). Two methods that are especially desirable to enterprise networks are handoff and Remote Authentication Dial-In User Service (RADIUS). Handoff allows seamless mobility on a wireless network, thus providing users with the ability to roam among enterprise wireless access points...
Nerve Net is a concept of regional wireless access platform where multiple service providers can provide their own services with the shared use of the network and sensors, making various context-aware services practical. It works as the nervous system of the human beings. Densely located, interconnected access points with database and data processing unit will provide mobility to terminals without...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
RFID technology automates several types of objects identification processes and improves lots of business transactions. Its ability to communicate through wireless networks gives huge advantages in comparison to optical barcode and manual identification systems. Unfortunately, the ability of RFID system to communicate through wireless communication opens up possibilities of being tracked by unauthorized...
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
With the proliferation of mobile devices and advances in positioning technologies, the location-based services (LBSs) have emerged as one of the killer applications for mobile users. Preserving user location privacy is one of the most crucial issues for LBSs. In this paper, we propose a new concept of k-anonymity to preserve users' location privacy. We devise a novel cloaking algorithm, called split...
TLS (Transport Layer Security) is the de facto standard that provides end-to-end secure communications with mutual authentication between two communicating entities. TLS has been designed to run from end to end, in which case intermediate hosts are considered as man in the middle attacks. Recently, TLS is widely deployed by applications and networks to exchange keys between more than two entities,...
Nowadays, instant messaging (IM) represents the most used messaging service for both home and corporate users. IM is used in many different application fields. Thus, it is an effective and easy means of network-based communication. Unfortunately, this technology does not provide built-in support for security features. This paper proposes a new and secure instant messaging protocol for a centralized...
RFID (Radio Frequency Identification) technology has been widely used in daily life, such as in access control, electronic passports, contactless credit cards, transportation, and animal tracking. However, this technology may cause various security and privacy problems, e.g. traceability of tag owner, malicious eavesdropping of tags and cloning of tags. In order to thwart these security and privacy...
In this paper, we propose a flexible access control mechanism, which integrates domain information and confidence values, for mobile commerce. When user requests an access to the data server, the data server fetches and returns results according to the user's access right. Algorithms demonstrate the flexible access control is effective and flexible.
Anonymity is an important feature in many two party communication systems. Its main meaning is that either the message sender or the receiver (or both) is unidentifiable to other users, even between themselves. Many mechanisms have been proposed to hide the identity of the sender, receiver, or both. Similarly, anonymity is an important feature in multi-party computing environments, but, little research...
This paper proposes a new handover mechanism between WiMAX and WLAN networks. It can support low latency by simplifying re-authentication process during handover. The proposed scheme allocates MA ID (Mobile Agent Identifier) as AAA key during initial connection establishment to WiMAX or WLAN. The MA ID plays a role as general AAA key which enables the MN to access to all ANs (Access Networks) connected...
IP-based emergency systems (or Next Generation 9-1-1) are being designed to allow any type of communication device, from any access network, to make IP-based emergency calls. A special purpose IP network - an Emergency Services IP Network (ESINet) - is being planned by public safety agencies. In this paper, we address the challenges on defining a framework for managing the security of the signaling...
Near Field Communication (NFC) is a short-range communication technology and has been applied around the world. The most common service of NFC will be micropayments. Technically, the card emulation mode of NFC will simulate mobile devices such as cell phones into stored value cards, and then debit from external readers. Apart from simulating cell phones as stored value cards, read-write mode of NFC...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.