190,734 research outputs found

    A security architecture for personal networks

    Get PDF
    The proliferation of personal mobile computing devices such as laptops and mo-\ud bile phones, as well as wearable computing devices such as belt computers, digital\ud bracelets and bio-medical sensors has created an opportunity to create a wireless\ud network to share information and resources amongst personal devices. One such\ud paradigm which utilizes pervasive and ubiquitous computing to create a network of\ud personal devices, both in the local vicinity and those at remote locations, is called a\ud Personal Network (PN). The aim of a Personal Network is to provide its users with\ud new and improved services.\ud As Personal Networks edge closer to reality, security becomes an important con-\ud cern since any vulnerability in the system will limit its practical use. However the\ud mobile and constrained nature of its constituting devices places unique requirements\ud on the design of Personal Networks, such as the need for low power consumption\ud and the ability to self organize in the face of intermittent connectivity. One of our\ud conclusions in this regard was that the new characteristics and possibilities offered\ud by Personal Networks mean that old solutions are often not suitable in their current\ud form. Therefore in this thesis we introduce a novel security architecture especially\ud designed for Personal Networks.\ud As people with a network background, our aim was not to develop new PN\ud specific cryptographic protocols, but to develop a model for secure network archi-\ud tecture. In this regard our focus is more on defining mechanisms for access control,\ud rather than the security properties of specific protocols. For instance, we propose\ud mechanisms for device personalization, key management, resource discovery, authen-\ud tication and secure network formation/communication. Our proposals are then ana-\ud lyzed analytically based on the main drivers for our design choices, with some parts\ud evaluated using the Ns-2 network simulator. Where possible we have attempted\ud to reuse existing and well established security protocols, knowing that proposing\ud a novel protocol specific to PNs only introduces the possibility of security flaws\ud common to new protocols.\ud Given the infancy of the PN concept, our first contribution is in promoting the\ud development of this concept as related to security. In this regard we have identified the different architectural components which play a part in enabling security\ud and specified their functional roles. This required an understanding of typical user behavior as well as development of scenarios which highlight the challenges and\ud requirements in connecting heterogeneous personal devices in a self organizing manner. The second main contribution is in designing a secure architecture around these\ud entities which meets the rather unique requirements identified earlier. In this regard we have specified mechanisms for the secure formation and communication in\ud Personal Networks as well as communication between different Personal Networks

    Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects

    Get PDF
    © 2013 IEEE. Internet of Things is smartly changing various existing research areas into new themes, including smart health, smart home, smart industry, and smart transport. Relying on the basis of 'smart transport,' Internet of Vehicles (IoV) is evolving as a new theme of research and development from vehicular ad hoc networks (VANETs). This paper presents a comprehensive framework of IoV with emphasis on layered architecture, protocol stack, network model, challenges, and future aspects. Specifically, following the background on the evolution of VANETs and motivation on IoV an overview of IoV is presented as the heterogeneous vehicular networks. The IoV includes five types of vehicular communications, namely, vehicle-to-vehicle, vehicle-to-roadside, vehicle-to-infrastructure of cellular networks, vehicle-to-personal devices, and vehicle-to-sensors. A five layered architecture of IoV is proposed considering functionalities and representations of each layer. A protocol stack for the layered architecture is structured considering management, operational, and security planes. A network model of IoV is proposed based on the three network elements, including cloud, connection, and client. The benefits of the design and development of IoV are highlighted by performing a qualitative comparison between IoV and VANETs. Finally, the challenges ahead for realizing IoV are discussed and future aspects of IoV are envisioned

    A security architecture for personal networks

    Get PDF
    Abstract Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption

    A personal networking solution

    Get PDF
    This paper presents an overview of research being conducted on Personal Networking Solutions within the Mobile VCE Personal Distributed Environment Work Area. In particular it attempts to highlight areas of commonality with the MAGNET initiative. These areas include trust of foreign devices and service providers, dynamic real-time service negotiation to permit context-aware service delivery, an automated controller algorithm for wireless ad hoc networks, and routing protocols for ad hoc networking environments. Where possible references are provided to Mobile VCE publications to enable further reading

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Recent advances in industrial wireless sensor networks towards efficient management in IoT

    Get PDF
    With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for wireless sensor networks design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross layer design of lightweight and cloud-based RESTful web service
    corecore