224 research outputs found

    Reserved Parking Validation

    Get PDF
    A common situation that we can testify every day: fossil fuel cars occupying electric cars charge only places, and handy capped reserved places, occupied with cars without the proper authorization. This is something that plagues our society, where the values and moral are forgotten, and our duties and rights are lost in the day-to-day life. There are more and more cars moving, every day, to the city center, where the lack of available parking, together with the lack of proper public transportation creates a chaotic situation. Also, the large proliferation of electric cars, that is not accompanied by a proportional availability of electric chargers, raises issues, where these cars’ drivers are not allowed to charge their vehicles, most of the times, because they are being used as abusive parking. This dissertation has the goal to identify and propose a universal solution, with low implementation and maintenance costs, that allows a fast and unambiguous validation of authorization of a user, for parking in a reserved parking space

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    CPA\u27s guide to wireless technology and networking

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1303/thumbnail.jp

    Femtocell deployment; next generation in cellular systems

    Get PDF
    The final Bachelor’s Thesis that is shown below has such a final purpose of giving an overview of the inclusion of the so-called Femtocells (or Home Node B) in the current cellular systems. The main objective is to give a clear but simple idea about the concepts of Femtocells, as well as to explain the benefits and disadvantages of the mass uses of these services both for consumers and associated companies with this phenomenon. In this text it is also possible to find a brief review of wireless technologies throughout the history of telecommunications, as well as an introduction to the more current wireless technologies, with a special interest in the concept of cellular systems. In the last chapter a simple mathematical explanation of the key issue of interference between Femtocells and macrocellular networks is presented, with a brief argument about possible solutions

    Mobile Authentication with NFC enabled Smartphones

    Get PDF
    Smartphones are becoming increasingly more deployed and as such new possibilities for utilizing the smartphones many capabilities for public and private use are arising. This project will investigate the possibility of using smartphones as a platform for authentication and access control, using near field communication (NFC). To achieve the necessary security for authentication and access control purposes, cryptographic concepts such as public keys, challenge-response and digital signatures are used. To focus the investigation a case study is performed based on the authentication and access control needs of an educational institutions student ID. To gain a more practical understanding of the challenges mobile authentication encounters, a prototype has successfully been developed on the basis of the investigation. The case study performed in this project argues that NFC as a standalone technology is not yet mature to support the advanced communication required by this case. However, combining NFC with other communication technologies such as Bluetooth has proven to be effective. As a result, a general evaluation has been performed on several aspects of the prototype, such as cost-effectiveness, usability, performance and security to evaluate the viability of mobile authentication

    On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment

    Get PDF
    The rapid advancement in wireless technology along with their low cost and ease of deployment have been attracting researchers academically and commercially. Researchers from private and public sectors are investing into enhancing the reliability, robustness, and security of radio frequency (RF) communications to accommodate the demand and enhance lifestyle. RF base communications -by nature- are slower and more exposed to attacks than a wired base (LAN). Deploying such networks in various cutting-edge mobile platforms (e.g. VANET, IoT, Autonomous robots) adds new challenges that impact the quality directly. Moreover, adopting such networks in public outdoor areas make them vulnerable to various attacks (regardless of the attacker motive). Therefore, the quality and security of the communications cannot be neglected especially when developing outdoor wireless applications/networks. While some wireless applications and platforms aim to provide comfort and infotainment, others are more critical to protect and save lives. Thus, the need for mobile broadband connections has been increased to accommodate such applications. The FCC took the first step to regulate and assure the quality when using these technologies by allocating spectrums and issuing standards and amendments (e.g. IEEE802.11a, b, g, n, and p) to deliver reliable and secure communications. In this dissertation, we introduce several problems related to the security and quality of communications in outdoor environments. Although we focus on the ISM-RF bands UHF and SHF (licensed and unlicensed) and their applications when solving quality and security issues nevertheless, the concept of propagating signals through the air for communications remain the same across other ISM bands. Therefore, problems and their solutions in this work can be applied to different wireless technologies with respect to environment and mobility

    BUILDING A DISTRIBUTED TRUST MODEL OF RESTFUL WEB SERVICES FOR MOBILE DEVICES

    Get PDF
    As of 2011, there were about 5,981 million mobile devices in the world [1] and there are 113.9 million mobile web users in 2012 [2]. With the popularity of web services for mobile devices, the concern of security for mobile devices has been brought up. Furthermore, with more and more cooperation of organizations, web services are now normally involved with more than one organization. How to trust coming requests from other organizations is an issue. This research focuses on building a trust model for the web services of mobile devices. It resolves the issues caused by mobile devices being stolen, lost, users abusing privileges, and cross-domain’s access control. The trust model is distributed in each node of the web servers. The trust value is calculated for every incoming request to decide whether the request should be served or not. The goals of the trust model are 1) flexible; 2) scalable; 3) lightweight. The implementation is designed and accomplished with the goals in mind. The experiments evaluate the overhead for the trust module and maximum capacity of the system

    Facial and Speech Identification System (FASIS) for Nokia Devices

    Get PDF
    The Facial and Speech Identification System (FASIS) enables added security to the modern smart phone by recognizing users with matching facial features and voicebased keyword input to access certain security sensitive features of the phone, while locking unrecognized users out. This system comes in response to the growing need of enhanced security for mobile phone users as more personal and confidential information are stored within the device

    Segurança em ambientes de proximidade

    Get PDF
    Mestrado em Engenharia de Computadores e TelemĂĄticaA crescente adopção de dispositivos mĂłveis, com cada vez mais capacidades de computação e comunicação, leva inevitavelmente Ă  questĂŁo de como podem ser explorados. O objectivo desta dissertação passa por explorar algumas dessas capacidades de forma a melhorar e evoluir a interac ção segura entre o utilizador e os serviços que utilizada no seu dia-a-dia. É particularmente interessante o uso destes dispositivos nĂŁo apenas como sistemas de armazenamento, mas como peças activas na interacção entre o utilizador e o mundo que o rodeia, um cenĂĄrio potenciado pelas crescentes capacidades de comunicação em proximidade destes dispositivos. Esta dissertação debruça-se sobre o estudo e possĂ­vel integração da proximidade fĂ­sica entre um utilizador e os sistemas que usa diariamente como um requisito extra na autenticação e comunicação entre eles, usando o seu dispositivo mĂłvel para interagir com os mesmos. De forma a demonstrar uma possĂ­vel integração destes elementos num sistema, este trabalho apresenta uma implementação que explora o uso de tecnologias de curto alcance como meio de comunicação e como requisito de autenticação, recorrendo a mecanismos de segurança para estabelecer comunicaçÔes privadas sobre redes pĂșblicas e garantir e veri car a autencidade da informa ção trocada e armazenada.The increasing adoption of mobile devices with more computing and communication capabilities inevitably raises the question of how to explore them. The goal of this dissertation is to explore some of those capabilities to improve and evolve secure interactions between the user and the services that he uses in his daily life. It is particularly interesting to use these devices not only as storage systems, but also as active elements in the interaction between the user and the world around him: this objective is boosted by the increasing proximity-based communication capabilities of those devices. This dissertation focus on the study and possible integration of the physical proximity between a user and the systems he uses every day as an extra requirement for authentication, using his mobile device to interact with them. To demonstrate a possible integration of these elements into a system, this work presents an implementation that explores the use of short-range wireless technologies as a communication mean and as a requirement for authentication, using security mechanisms to establish private communications through public networks and to ensure and verify the authenticity of the information exchanged and stored

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    • 

    corecore