3,072 research outputs found

    Towards NFC payments using a lightweight architecture for the Web of Things

    Get PDF
    The Web (and Internet) of Things has seen the rapid emergence of new protocols and standards, which provide for innovative models of interaction for applications. One such model fostered by the Web of Things (WoT) ecosystem is that of contactless interaction between devices. Near Field Communication (NFC) technology is one such enabler of contactless interactions. Contactless technology for the WoT requires all parties to agree one common definition and implementation and, in this paper, we propose a new lightweight architecture for the WoT, based on RESTful approaches. We show how the proposed architecture supports the concept of a mobile wallet, enabling users to make secure payments employing NFC technology with their mobile devices. In so doing, we argue that the vision of the WoT is brought a step closer to fruition

    Network layer access control for context-aware IPv6 applications

    Get PDF
    As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    A Secure Mobile App Solution Using Human Behavioral Context and Analytic Hierarchy Process

    Get PDF
    AbstractMobile devices have gained popularity worldwide. The mobile device flexibility has encouraged users to turn their mobile devices into primary hubs for storing information. This paper adopts the classical CW-Lite security models as the framework and the human behavioral patterns as the context. The selected behavioral aspects refer to mobile application and mobility, deployed as major characteristics that determine security control decisions. This proposed paper requires the application of human behavioral context on mobile phones. The solution involves the novel use of behavioral aspects to improve the security of mobile phones. Two important scenarios are incorporated: analytic hierarchy process (AHP) mobile application and AHP mobility. The proposed methodology is superior because it can detect the change in the user behavior in comparison with an intruder. The applied intelligent human behavioral context on the CW-Lite model shows the advantages of AHP in detecting the changes in the user behavior and in authenticating the identity of the main user. These advantages ensure reliability and security of the phone
    • …
    corecore