1,525 research outputs found
Towards Secure, Power-Efficient and Location-Aware Mobile Computing
In the post-PC era, mobile devices will replace desktops and become the main personal computer for many people. People rely on mobile devices such as smartphones and tablets for everything in their daily lives. A common requirement for mobile computing is wireless communication. It allows mobile devices to fetch remote resources easily. Unfortunately, the increasing demand of the mobility brings many new wireless management challenges such as security, energy-saving and location-awareness. These challenges have already impeded the advancement of mobile systems. In this dissertation we attempt to discover the guidelines of how to mitigate these problems through three general communication patterns in 802.11 wireless networks. We propose a cross-section of a few interesting and important enhancements to manage wireless connectivity. These enhancements provide useful primitives for the design of next-generation mobile systems in the future.;Specifically, we improve the association mechanism for wireless clients to defend against rogue wireless Access Points (APs) in Wireless LANs (WLANs) and vehicular networks. Real-world prototype systems confirm that our scheme can achieve high accuracy to detect even sophisticated rogue APs under various network conditions. We also develop a power-efficient system to reduce the energy consumption for mobile devices working as software-defined APs. Experimental results show that our system allows the Wi-Fi interface to sleep for up to 88% of the total time in several different applications and reduce the system energy by up to 33%. We achieve this while retaining comparable user experiences. Finally, we design a fine-grained scalable group localization algorithm to enable location-aware wireless communication. Our prototype implemented on commercial smartphones proves that our algorithm can quickly locate a group of mobile devices with centimeter-level accuracy
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabilities (WIFI)
The growing volume of attacks on the Internet has increased the demand for more robust systems and sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The being aware of the flaws on a network is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. This paper has as main objective to minimize damages and preventing the attackers from exploiting weaknesses and vulnerabilities in the 4 ways handshake (WIFI).We equally present a detail study on various attacks and some solutions to avoid or prevent such attacks in WLAN
Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel
AbstractWith increase in Smartphone users, uses have also increased such as email, gaming, internet banking etc. which requires it to always remain connected with Wi-Fi, thus making it vulnerable to numerous attacks. The endeavour in this paper is to explore Smartphone malware and combat challenges associated with it. Authors have proposed a novel three layer security model which detect and defence against the malware attack in network traffic and communication access point. Fine grained channel permission system is used to grant the permission to access the Wi-Fi access point thus providing security when any communication session takes place between Smartphone user and server though SSL handshake protocol. It also helps in detection of the interval time between packets sent and received which give impetus for threshold value used by TMM-HDT algorithm
Conversation Exchange Dynamics: A New Signal Primitive for Computer Network Intrusion Detection
As distributed network intrusion detection systems expand
to integrate hundreds and possibly thousands of sensors,
managing and presenting the associated sensor data becomes
an increasingly complex task. Methods of intelligent data
reduction are needed to make sense of the wide dimensional
variations. We present a new signal primitive we call
conversation exchange dynamics (CED) that accentuates
anomalies in traffic flow. This signal provides an aggregated
primitive that may be used by intrusion detection systems to
base detection strategies upon. Indications of the signal in a
variety of simulated and actual anomalous network traffic
from distributed sensor collections are presented.
Specifically, attacks from the MIT Lawrence Livermore IDS data set are considered. We conclude that CED presents a useful signal primitive for assistance in conducting IDS
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
Mobile collaborative learning (MCL) is highly acknowledged and focusing
paradigm in eductional institutions and several organizations across the world.
It exhibits intellectual synergy of various combined minds to handle the
problem and stimulate the social activity of mutual understanding. To improve
and foster the baseline of MCL, several supporting architectures, frameworks
including number of the mobile applications have been introduced. Limited
research was reported that particularly focuses to enhance the security of
those pardigms and provide secure MCL to users. The paper handles the issue of
rogue DHCP server that affects and disrupts the network resources during the
MCL. The rogue DHCP is unauthorized server that releases the incorrect IP
address to users and sniffs the traffic illegally. The contribution specially
provides the privacy to users and enhances the security aspects of mobile
supported collaborative framework (MSCF). The paper introduces multi-frame
signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with
novel algorithms through addition of new rules in IDS and mathematcal model.
The major target of contribution is to detect the malicious attacks and blocks
the illegal activities of rogue DHCP server. This innovative security mechanism
reinforces the confidence of users, protects network from illicit intervention
and restore the privacy of users. Finally, the paper validates the idea through
simulation and compares the findings with other existing techniques.Comment: 20 pages and 11 figures; International Journal of Computer Networks
and Communications (IJCNC) July 2012, Volume 4. Number
- …