29 research outputs found
An effective trust establishment scheme for authentication in mobile ad-hoc networks
Version of RecordPublishe
Recommended from our members
An Implementation of Transmit Power Control in 802.11b Wireless Networks ; CU-CS-934-02
Recommended from our members
Key management for beyond 5G mobile small cells: a survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders are unanimous that densification of mobile networks is the way forward. The densification will be realized by means of small cell technology, and it is capable of providing coverage with a high data capacity. The EU-funded H2020-MSCA project “SECRET” introduced covering the urban landscape with mobile small cells, since these take advantages of the dynamic network topology and optimizes network services in a cost-effective fashion. By taking advantage of the device-to-device communications technology, large amounts of data can be transmitted over multiple hops and, therefore, offload the general network. However, this introduction of mobile small cells presents various security and privacy challenges. Cryptographic security solutions are capable of solving these as long as they are supported by a key management scheme. It is assumed that the network infrastructure and mobile devices from network users are unable to act as a centralized trust anchor since these are vulnerable targets to malicious attacks. Security must, therefore, be guaranteed by means of a key management scheme that decentralizes trust. Therefore, this paper surveys the state-of-the-art key management schemes proposed for similar network architectures (e.g., mobile ad hoc networks and ad hoc device-to-device networks) that decentralize trust. Furthermore, these key management schemes are evaluated for adaptability in a network of mobile small cells
Dotació d'anonimat a plataforma JXTA
En aquest projecte es presenta un mecanisme per a dotar d'anonimat a la missatgeria de JXTA. El sistema desenvolupat permet enviar missatges anònims i respondre a aquests, mantenint l'anonimat dels peers comunicants de cara a la resta. El mecanisme passa inadvertit de cara al receptor d'un missatge anònim però, en canvi, no és transparent de cara a l'emissor. El mecanisme es basa en una adaptació del protocol OnionRouting i es desplega a JXTA com un servei. Cada peer corre el seu propi servei i aquests col·laboren entre sí per a re-dirigir els missatges obtenint, així, anonimat