Author: Jun Liu
Publisher:
ISBN:
Category :
Languages : en
Pages : 137
Book Description
Anonymous Communication in Wireless Mobile Networks
Anonymous Communications in Wireless Access Networks
Author: Alisdair McDiarmid
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
The growth of mobile communications systems over the past decade indicates a trend towards an always-on, ubiquitously networked society. This increase in communications availability leads to a corresponding increase in information gathered, processed, and transmitted over these networks. Some of this information is loosely considered by users of these systems to be private, and in some cases, even the general pattern of use of network services could be regarded as revealing personal information. Therefore, along with growth in communications comes growth in privacy concerns. One approach to protecting users' privacy is to offer anonymity: the ability to blend into a crowd, such that any communications cannot be attributed to a particular real identity. This research study investigates two aspects of providing anonymity in mobile networks: in services, and for network access. Anonymous mobile service provision is approached by analysing several fixed-network approaches to anonymous communications, and examining how they can be reapplied to mobile systems. A set of conclusions and recommendations for future implementations are contributed, along with a case study of providing anonymous location-based services for mobile systems. Being able to connect to a network while remaining truly anonymous is a novel concept, only made possible by the untethered nature of mobile communications. Analysis of the practical requirements for achieving such service is presented, and a solution is proposed, based on a new approach to mobile network service provision called the Digital Marketplace. To support this approach to network access, the fair and reliable operation of the market is ensured by securing its protocol operation. Further modifications to this scheme are proposed, in order to enable fully anonymous network access.
Publisher:
ISBN:
Category :
Languages : en
Pages : 0
Book Description
The growth of mobile communications systems over the past decade indicates a trend towards an always-on, ubiquitously networked society. This increase in communications availability leads to a corresponding increase in information gathered, processed, and transmitted over these networks. Some of this information is loosely considered by users of these systems to be private, and in some cases, even the general pattern of use of network services could be regarded as revealing personal information. Therefore, along with growth in communications comes growth in privacy concerns. One approach to protecting users' privacy is to offer anonymity: the ability to blend into a crowd, such that any communications cannot be attributed to a particular real identity. This research study investigates two aspects of providing anonymity in mobile networks: in services, and for network access. Anonymous mobile service provision is approached by analysing several fixed-network approaches to anonymous communications, and examining how they can be reapplied to mobile systems. A set of conclusions and recommendations for future implementations are contributed, along with a case study of providing anonymous location-based services for mobile systems. Being able to connect to a network while remaining truly anonymous is a novel concept, only made possible by the untethered nature of mobile communications. Analysis of the practical requirements for achieving such service is presented, and a solution is proposed, based on a new approach to mobile network service provision called the Digital Marketplace. To support this approach to network access, the fair and reliable operation of the market is ensured by securing its protocol operation. Further modifications to this scheme are proposed, in order to enable fully anonymous network access.
Anonymous and Untraceable Communications in Mobile Wireless Networks
Advances in Electronics, Communication and Computing
Author: Akhtar Kalam
Publisher: Springer
ISBN: 9811047650
Category : Technology & Engineering
Languages : en
Pages : 808
Book Description
This book is a compilation of research work in the interdisciplinary areas of electronics, communication, and computing. This book is specifically targeted at students, research scholars and academicians. The book covers the different approaches and techniques for specific applications, such as particle-swarm optimization, Otsu’s function and harmony search optimization algorithm, triple gate silicon on insulator (SOI)MOSFET, micro-Raman and Fourier Transform Infrared Spectroscopy (FTIR) analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, Ground-penetrating radar (GPR) with conducting surfaces, and digital image forgery detection. The contents of the book will be useful to academic and professional researchers alike.
Publisher: Springer
ISBN: 9811047650
Category : Technology & Engineering
Languages : en
Pages : 808
Book Description
This book is a compilation of research work in the interdisciplinary areas of electronics, communication, and computing. This book is specifically targeted at students, research scholars and academicians. The book covers the different approaches and techniques for specific applications, such as particle-swarm optimization, Otsu’s function and harmony search optimization algorithm, triple gate silicon on insulator (SOI)MOSFET, micro-Raman and Fourier Transform Infrared Spectroscopy (FTIR) analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, Ground-penetrating radar (GPR) with conducting surfaces, and digital image forgery detection. The contents of the book will be useful to academic and professional researchers alike.
Mobile and Wireless Network Security and Privacy
Author: S. Kami Makki
Publisher: Springer Science & Business Media
ISBN: 0387710582
Category : Technology & Engineering
Languages : en
Pages : 232
Book Description
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.
Publisher: Springer Science & Business Media
ISBN: 0387710582
Category : Technology & Engineering
Languages : en
Pages : 232
Book Description
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the reader a good idea of the current state-of-the-art technologies in mobile and wireless network security and privacy.
An Improved and Robust Anonymous Authentication Scheme for Roaming in Global Mobility Networks
Author: Ahmed Fraz Baig
Publisher: Anchor Academic Publishing
ISBN: 3960671474
Category : Computers
Languages : en
Pages : 65
Book Description
Wireless communication systems are extensively used in the current decade. Internet based applications are accessed by mobile networks at any time and from anywhere. Nowadays, roaming in mobile communication has become extremely popular. Mobility is the function that allows a user to move around and, at the same time, stay inside the network. The Global Mobility Network (GLOMONET) plays a very important role in wireless communication. When people visit some other country they have to use the mobile services. In GLOMONET, the roaming user, being in a foreign country, uses the mobile services with the help of their home country network. Mobile users connect themselves to a foreign network and the foreign network verifies the legality of the mobile user through their home network and home agent. Due to the technological improvements, many security issues have been raised up. While designing the security protocols for wireless networks, communication and computation costs are very important. The objective of this study is to propose an authentication scheme that has the ability to detect and resist all possible attacks. Formal security analysis and authenticity of proposed thesis is analyzed with BAN logic and ProVerif. Furthermore, the author checked the security of the proposed scheme informally against different attacks.
Publisher: Anchor Academic Publishing
ISBN: 3960671474
Category : Computers
Languages : en
Pages : 65
Book Description
Wireless communication systems are extensively used in the current decade. Internet based applications are accessed by mobile networks at any time and from anywhere. Nowadays, roaming in mobile communication has become extremely popular. Mobility is the function that allows a user to move around and, at the same time, stay inside the network. The Global Mobility Network (GLOMONET) plays a very important role in wireless communication. When people visit some other country they have to use the mobile services. In GLOMONET, the roaming user, being in a foreign country, uses the mobile services with the help of their home country network. Mobile users connect themselves to a foreign network and the foreign network verifies the legality of the mobile user through their home network and home agent. Due to the technological improvements, many security issues have been raised up. While designing the security protocols for wireless networks, communication and computation costs are very important. The objective of this study is to propose an authentication scheme that has the ability to detect and resist all possible attacks. Formal security analysis and authenticity of proposed thesis is analyzed with BAN logic and ProVerif. Furthermore, the author checked the security of the proposed scheme informally against different attacks.
Wireless Sensor and Actor Networks
Author: Luis Orozco-Barbosa
Publisher: Springer
ISBN: 0387748997
Category : Technology & Engineering
Languages : en
Pages : 250
Book Description
This book presents the proceedings of the first IFIP WG 6.8 conference on Wireless Sensor and Actor Networks held in Albacete, Spain. The papers selected to be included in this volume illustrate the state-of-the-art and current trends in the area of wireless sensor and actor networks. The comprehensive program was organized into eight topics: Actors; Applications; Security; Energy; Quality of Service; Localization; Middleware; Protocols.
Publisher: Springer
ISBN: 0387748997
Category : Technology & Engineering
Languages : en
Pages : 250
Book Description
This book presents the proceedings of the first IFIP WG 6.8 conference on Wireless Sensor and Actor Networks held in Albacete, Spain. The papers selected to be included in this volume illustrate the state-of-the-art and current trends in the area of wireless sensor and actor networks. The comprehensive program was organized into eight topics: Actors; Applications; Security; Energy; Quality of Service; Localization; Middleware; Protocols.
Security and Privacy in Wireless and Mobile Networks
Author: Georgios Kambourakis
Publisher: MDPI
ISBN: 3038427799
Category : Technology & Engineering
Languages : en
Pages : 173
Book Description
This book is a printed edition of the Special Issue "Security and Privacy in Wireless and Mobile Networks" that was published in Future Internet
Publisher: MDPI
ISBN: 3038427799
Category : Technology & Engineering
Languages : en
Pages : 173
Book Description
This book is a printed edition of the Special Issue "Security and Privacy in Wireless and Mobile Networks" that was published in Future Internet
Handbook of Research on Wireless Security
Author: Yan Zhang
Publisher: IGI Global
ISBN: 159904899X
Category : Computers
Languages : en
Pages : 860
Book Description
"This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source forstudents, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection"--Provided by publisher.
Publisher: IGI Global
ISBN: 159904899X
Category : Computers
Languages : en
Pages : 860
Book Description
"This book combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative reference source forstudents, educators, faculty members, researchers, engineers in the field of wireless security, it will make an invaluable addition to any library collection"--Provided by publisher.
Security and Privacy in Communication Networks
Author: Yan Chen
Publisher: Springer Science & Business Media
ISBN: 3642052835
Category : Computers
Languages : en
Pages : 471
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.
Publisher: Springer Science & Business Media
ISBN: 3642052835
Category : Computers
Languages : en
Pages : 471
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.