3 research outputs found

    Low-cost wireless mesh communications based on openWRT and voice over internet protocol

    Get PDF
    Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-line-of-sight (NLOS) condition, they are limited to reception distances up to 55 meters

    Eliciting Security Requirments For Mobile Apps: A Replication Study

    Get PDF
    Mobile applications (mobile apps) are becoming a common medium for conducting transaction, saving data and exchanging information online. However, an important issue that has been overlooked is the emphasis on security issues at the early stage of mobile apps development. It has become a common practice among requirements engineers to deal with security issues after the mobile apps have been developed. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. Motivated by this problem, we propose an automated support tool to assist requirements engineers to elicit security related requirements at the early stage of mobile apps development. This paper reported a replication of a study from our previous work that describes our user study and tool support, called MobiMEReq. This tool uses SecEUCs and SecEUIs prototype model to automatically elicit the security attributes requirements of mobile apps. In this paper, we reported the results drawn from an experiment of a user study to compare the capability of the MobiMEReq in relation to the manual approach. The results of the user study show that the tool support has higher accuracy rate in comparison to the manual approach to extract security attributes elicited from functional requirements. This implies that our tool is able to help requirements engineers to easily elicit security attribute requirements of mobile apps

    Building Public Key Infrastructure for MANET with Help of B.A.T.M.A.N. Advanced

    No full text
    corecore