224 research outputs found
Reserved Parking Validation
A common situation that we can testify every day: fossil fuel cars occupying electric cars
charge only places, and handy capped reserved places, occupied with cars without the
proper authorization.
This is something that plagues our society, where the values and moral are forgotten, and
our duties and rights are lost in the day-to-day life. There are more and more cars moving,
every day, to the city center, where the lack of available parking, together with the lack
of proper public transportation creates a chaotic situation. Also, the large proliferation of
electric cars, that is not accompanied by a proportional availability of electric chargers,
raises issues, where these carsâ drivers are not allowed to charge their vehicles, most of
the times, because they are being used as abusive parking.
This dissertation has the goal to identify and propose a universal solution, with low implementation
and maintenance costs, that allows a fast and unambiguous validation of
authorization of a user, for parking in a reserved parking space
Multibiometric security in wireless communication systems
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and
WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition.
First is the enrolment phase by which the database of watermarked fingerprints with
memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel.
Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user.
The following three steps then involve speaker recognition including the user
responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user.
In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint
image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and
sliding neighborhood) have been followed with further two steps for embedding, and
extracting the watermark into the enhanced fingerprint image utilising Discrete
Wavelet Transform (DWT).
In the speaker recognition stage, the limitations of this technique in wireless
communication have been addressed by sending voice feature (cepstral coefficients)
instead of raw sample. This scheme is to reap the advantages of reducing the
transmission time and dependency of the data on communication channel, together
with no loss of packet. Finally, the obtained results have verified the claims
CPA\u27s guide to wireless technology and networking
https://egrove.olemiss.edu/aicpa_guides/1303/thumbnail.jp
Femtocell deployment; next generation in cellular systems
The final Bachelorâs Thesis that is shown below has such a final purpose of
giving an overview of the inclusion of the so-called Femtocells (or Home Node
B) in the current cellular systems. The main objective is to give a clear but
simple idea about the concepts of Femtocells, as well as to explain the
benefits and disadvantages of the mass uses of these services both for
consumers and associated companies with this phenomenon.
In this text it is also possible to find a brief review of wireless technologies
throughout the history of telecommunications, as well as an introduction to the
more current wireless technologies, with a special interest in the concept of
cellular systems.
In the last chapter a simple mathematical explanation of the key issue of
interference between Femtocells and macrocellular networks is presented,
with a brief argument about possible solutions
Mobile Authentication with NFC enabled Smartphones
Smartphones are becoming increasingly more deployed and as such new possibilities for utilizing the smartphones many capabilities for public and private use are arising. This project will investigate the possibility of using smartphones as a platform for authentication and access control, using near field communication (NFC). To achieve the necessary security for authentication and access control purposes, cryptographic concepts such as public keys, challenge-response and digital signatures are used. To focus the investigation a case study is performed based on the authentication and access control needs of an educational institutions student ID. To gain a more practical understanding of the challenges mobile authentication encounters, a prototype has successfully been developed on the basis of the investigation. The case study performed in this project argues that NFC as a standalone technology is not yet mature to support the advanced communication required by this case. However, combining NFC with other communication technologies such as Bluetooth has proven to be effective. As a result, a general evaluation has been performed on several aspects of the prototype, such as cost-effectiveness, usability, performance and security to evaluate the viability of mobile authentication
On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment
The rapid advancement in wireless technology along with their low cost and ease of deployment have been attracting researchers academically and commercially. Researchers from private and public sectors are investing into enhancing the reliability, robustness, and security of radio frequency (RF) communications to accommodate the demand and enhance lifestyle. RF base communications -by nature- are slower and more exposed to attacks than a wired base (LAN). Deploying such networks in various cutting-edge mobile platforms (e.g. VANET, IoT, Autonomous robots) adds new challenges that impact the quality directly. Moreover, adopting such networks in public outdoor areas make them vulnerable to various attacks (regardless of the attacker motive). Therefore, the quality and security of the communications cannot be neglected especially when developing outdoor wireless applications/networks.
While some wireless applications and platforms aim to provide comfort and infotainment, others are more critical to protect and save lives. Thus, the need for mobile broadband connections has been increased to accommodate such applications. The FCC took the first step to regulate and assure the quality when using these technologies by allocating spectrums and issuing standards and amendments (e.g. IEEE802.11a, b, g, n, and p) to deliver reliable and secure communications.
In this dissertation, we introduce several problems related to the security and quality of communications in outdoor environments. Although we focus on the ISM-RF bands UHF and SHF (licensed and unlicensed) and their applications when solving quality and security issues nevertheless, the concept of propagating signals through the air for communications remain the same across other ISM bands. Therefore, problems and their solutions in this work can be applied to different wireless technologies with respect to environment and mobility
BUILDING A DISTRIBUTED TRUST MODEL OF RESTFUL WEB SERVICES FOR MOBILE DEVICES
As of 2011, there were about 5,981 million mobile devices in the world [1] and there are 113.9 million mobile web users in 2012 [2]. With the popularity of web services for mobile devices, the concern of security for mobile devices has been brought up. Furthermore, with more and more cooperation of organizations, web services are now normally involved with more than one organization. How to trust coming requests from other organizations is an issue.
This research focuses on building a trust model for the web services of mobile devices. It resolves the issues caused by mobile devices being stolen, lost, users abusing privileges, and cross-domainâs access control. The trust model is distributed in each node of the web servers. The trust value is calculated for every incoming request to decide whether the request should be served or not.
The goals of the trust model are 1) flexible; 2) scalable; 3) lightweight. The implementation is designed and accomplished with the goals in mind. The experiments evaluate the overhead for the trust module and maximum capacity of the system
Facial and Speech Identification System (FASIS) for Nokia Devices
The Facial and Speech Identification System (FASIS) enables added security to the modern smart phone by recognizing users with matching facial features and voicebased keyword input to access certain security sensitive features of the phone, while locking unrecognized users out. This system comes in response to the growing need of enhanced security for mobile phone users as more personal and confidential information are stored within the device
Segurança em ambientes de proximidade
Mestrado em Engenharia de Computadores e TelemåticaA crescente adopção de dispositivos móveis, com cada vez mais capacidades
de computação e comunicação, leva inevitavelmente à questão de
como podem ser explorados. O objectivo desta dissertação passa por
explorar algumas dessas capacidades de forma a melhorar e evoluir a interac
ção segura entre o utilizador e os serviços que utilizada no seu dia-a-dia.
Ă particularmente interessante o uso destes dispositivos nĂŁo apenas como
sistemas de armazenamento, mas como peças activas na interacção entre
o utilizador e o mundo que o rodeia, um cenĂĄrio potenciado pelas crescentes
capacidades de comunicação em proximidade destes dispositivos.
Esta dissertação debruça-se sobre o estudo e possĂvel integração da proximidade
fĂsica entre um utilizador e os sistemas que usa diariamente como
um requisito extra na autenticação e comunicação entre eles, usando o
seu dispositivo mĂłvel para interagir com os mesmos. De forma a demonstrar
uma possĂvel integração destes elementos num sistema, este trabalho
apresenta uma implementação que explora o uso de tecnologias de curto
alcance como meio de comunicação e como requisito de autenticação,
recorrendo a mecanismos de segurança para estabelecer comunicaçÔes
privadas sobre redes pĂșblicas e garantir e veri car a autencidade da informa
ção trocada e armazenada.The increasing adoption of mobile devices with more computing and communication
capabilities inevitably raises the question of how to explore
them. The goal of this dissertation is to explore some of those capabilities
to improve and evolve secure interactions between the user and the
services that he uses in his daily life. It is particularly interesting to use
these devices not only as storage systems, but also as active elements in
the interaction between the user and the world around him: this objective
is boosted by the increasing proximity-based communication capabilities of
those devices.
This dissertation focus on the study and possible integration of the physical
proximity between a user and the systems he uses every day as an
extra requirement for authentication, using his mobile device to interact
with them. To demonstrate a possible integration of these elements into
a system, this work presents an implementation that explores the use of
short-range wireless technologies as a communication mean and as a requirement
for authentication, using security mechanisms to establish private
communications through public networks and to ensure and verify the
authenticity of the information exchanged and stored
Multibiometric security in wireless communication systems
This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present oneâs fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
- âŠ