Mobile Network Research Papers - Academia.edu (original) (raw)

Resource-constrained mobile devices are becoming increasingly popular within distributed networks, but introduce a weak point of security. Existing protocols for distributed mobile device networks, such as SPKI/SDSI, are emerging... more

Resource-constrained mobile devices are becoming increasingly popular within distributed networks, but introduce a weak point of security. Existing protocols for distributed mobile device networks, such as SPKI/SDSI, are emerging standards and lack built-in confidentiality, mutual authorisation and mutual authentication. Our research addresses the above-mentioned security limitations of an existing network security protocol for distributed mobile device networks. By securing the protocol and minimising exchanged messages, our work gives a result which is both faster than the current protocol and more secure. This will open up new application areas for SPKI/SDSI.

Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society... more

Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society from the availability and correct (proved) function of modern communication services. First, I'll give a short overview on threats in communication networks (grids, clouds, etc), protocols and secure personal devices. Then I'll discuss current network security approaches based on anonymous message exchanges within communicating systems. Cryptography was first used to ensure data confidentiality, it has been “democratized” by ensuring the safety of telecommunications services, thereby extending its scope to authentication of a person or device, or a message, non-repudiation, integrity but also the anonymity of transactions. The anonymity is sometimes quite important in the new telecommunication and mobile networks services, much more than just message confidentiality. The talk will focus on some examples and new approaches developed in our research laboratory to deal with anonymity in routing protocols for mobile communicating systems.

The tremendous advances in wireless networks, mobile computing, and sensor networks, along with the rapid growth of small, portable and powerful computing devices, offers more and more opportunities for pervasive computing and... more

The tremendous advances in wireless networks, mobile computing, and sensor networks, along with the rapid growth of small, portable and powerful computing devices, offers more and more opportunities for pervasive computing and communications. This topic deals with cutting-edge research in various aspects related to the theory and practice of mobile computing or wireless and mobile networking. These aspects include architectures, algorithms, networks, protocols, modeling and performance issues, data management, ...

In this paper, the authors examine UK mobile users’ perceptions of m-commerce utilization. For this purpose, the authors devise a Mobile Network Utilization Model empirically tested in experimental settings. The empirical findings reveal... more

In this paper, the authors examine UK mobile users’ perceptions of m-commerce utilization. For this purpose, the authors devise a Mobile Network Utilization Model empirically tested in experimental settings. The empirical findings reveal strong support for the capability of the proposed utilization model in measuring the concept of Mobile Task-Technology Fit (MTTF) and explaining the utilization of m-commerce services among UK mobile users. In particular, their research finds that MTTF and m-commerce utilization are dependent on the interactions between the key components of a wider mobile network, namely mobile users, mobile devices, mobile tasks, mobile operators, as well as mobile vendors. The authors identify 15 factors as a result of such interaction and the importance of these factors in explaining MTTF and the utilization of m-commerce services.

Today, mobile communications play a central role in the voice/data network arena. With the deployment of 3G just around the corner, new directions are already being researched. In this paper we address the evolution of mobile... more

Today, mobile communications play a central role in the voice/data network arena. With the deployment of 3G just around the corner, new directions are already being researched. In this paper we address the evolution of mobile communications, from its first generation, 1G, to the latest 3G, and ...

The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that... more

The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-of-Things, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when ...

The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to... more

The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, h...

Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible... more

Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible plaintexts, depending on the key used or otherwise makes it impossible to prove the existence of the real message without the proper encryption key. This allows the sender to have plausible deniability if compelled to give up their encryption key. Deniable file systems allow for the creation of an encrypted volume on a hard disk and a second, hidden deniable file system created inside with access by a second password. The objective of this research is to establish whether or not evidence of a hidden volume can be found in deniable encryption tools using conventional forensic analysis. A testbed is developed using open source deniable encryption software and forensics tools with the objective of proving or disproving this claim.

This paper describes an algorithm for distributed acoustic navigation for Autonomous Underwater Vehicles (AUVs). Whereas typical AUV navigation systems utilize pre-calibrated arrays of static transponders, our work seeks to create a fully... more

This paper describes an algorithm for distributed acoustic navigation for Autonomous Underwater Vehicles (AUVs). Whereas typical AUV navigation systems utilize pre-calibrated arrays of static transponders, our work seeks to create a fully mobile network of AUVs that perform acoustic ranging and data exchange with one another to achieve cooperative positioning for extended duration missions over large areas. The algorithm enumerates possible solutions for the AUV trajectory based on dead-reckoning and range-only measurements provided by acoustic modems that are mounted on each vehicle, and chooses the trajectory via minimization of a cost function based on these constraints. The resulting algorithm is computationally efficient, meets the strict bandwidth requirements of available AUV modems, and has potential to scale well to networks of large numbers of vehicles. The method has undergone extensive experimentation, and results from three different scenarios are reported in this paper...