7 research outputs found

    Study of Physical Layer Security and Teaching Methods in Wireless Communications

    Get PDF
    In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two course modules have been developed for students to understand signal propagation in physical layer and how it is used to enhance channel security along with natural and man-made noise

    The Use of Wireless Internet Parks to Facilitate Adoption and Diffusion of E-Government Services: An Empirical Study in Qatar

    Get PDF
    The Qatari government has launched Wireless Internet Parks (iPark) concept under their national electronic government (e-government) initiative with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government hopes to increase accessibility of e-government services and encourage their citizens to actively participate in the global information society with a view of bridging the digital divide. The adoption and diffusion of iPark services will depend on user acceptance and availability of wireless technology. This paper examines an extended technology acceptance model (TAM) that proposes individual differences, technology complexity, and trust environment constructs to determine perceived usefulness and perceived ease of the iPark initiative by using a survey based study. Results of the survey showed that among other constructs Wireless Internet trust and technology complexity has a significant affect on perceived usefulness of iPark services

    Investigating the Adoption of eGovernment Services in Qatar Using the UTAUT Model

    Get PDF
    Electronic government (e-government) initiatives are in their early stages in many developing countries and faced with various issues pertaining to their implementation of e-government services. Like many other developing countries, the e-government initiative in the state of Qatar has faced a number of challenges since its inception in 2000. This study utilises the Unified Theory of Acceptance and Use of technology (UTAUT) model to explore the adoption and diffusion of e-government services in the state of Qatar. 1179 citizens were surveyed using the UTAUT model. The empirical data reveal that performance expectancy, effort expectancy, and social influences determine citizens’ behavioural intention. Additionally, facilitating conditions and behavioural intention determine citizens’ use of e-government services. Implications for practice and research are discussed

    Modelling use continuance in virtual worlds: The case of second life

    Get PDF
    Electronic government (e-government) has shown encouraging results in developed countries in the context of delivering electronic information and services to citizens. However, despite the many lessons that can be learned from the experiences of those egovernment initiatives, developing countries are still faced with various issues pertaining to their implementation of e-government services. Like many other developing countries, the e-government initiative in the state of Qatar has faced a number of challenges since its inception in 2000. Using a survey based study this paper describes citizens’ behavioural intention in terms of applying the Unified Theory of Acceptance and Use of technology (UTAUT) model to explore the adoption and diffusion of e-government services in the state of Qatar. Analysis of the results indicates that there is significant positive relationship between performance expectancy, effort expectancy, social influence and behavioural intention to use e-government services for the citizens of Qatar. Implications for practice and research are discussed

    Mpdtn: A Novel Mobile Payment Scheme for Secure and Private Transactions

    Get PDF
    Mobile commerce is becoming more and more popular which makes it possible to purchase goods and services anywhere and anytime. However, traditional payment schemes do not suffice for our demand as more novel commercial services were provided. Therefore, it’s urgent to construct a safer and more convenient payment scheme for the forthcoming mobile era. A mobile payment scheme is proposed in the paper. The scheme called MPDTN provides an ideal mobile payment with dynamic transaction numbers. Through it, consumers can pay fares by using mobile phones no matter in real store or virtual shop. Besides explaining our payment architecture and processes in detail, evaluation of the MPDTN’s security from the aspect of defender and different roles of the attackers is provided in the paper. The investigation shows that, MPDTN can not only satisfy security criteria of confidence, integrity, authentication, and non-repudiation but also provide full transaction privacy to consumers

    End-to-end security for mobile devices

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004Includes bibliographical references (leaves: 120)Text in English; Abstract: Turkish and Englishix, 133 leavesEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used in Internet, together with its predecessor, SSL protocol. By using TLS protocol in mobile world, the advantage of the proven security model of this protocol can be taken.J2ME (Java 2 Micro Edition) has been the de facto application platform used in mobile devices. This thesis aims to provide an end-to-end security protocol implementation based on TLS 1.0 specification and that can run on J2ME MIDP (Mobile Information Device Profile) environment. Because of the resource intensive public-key operations used in TLS, this protocol needs high resources and has low performance. Another motivation for the thesis is to adapt the protocol for mobile environment and to show that it is possible to use the protocol implementation in both client and server modes. An alternative serialization mechanism is used instead of the standard Java object serialization that is lacking in MIDP. In this architecture, XML is used to transmit object data.The mobile end-to-end security protocol has the main design issues of maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes the replacement of this library with another cryptography package easier.Mobile end-to-end security protocol is tested with a mobile hospital reservation system application. Test cases are prepared to measure the performance of the protocol implementation with different cipher suites and platforms. Measured values of all handshake operation and defined time spans are given in tables and compared with graphs

    Autenticazione degli utenti in scenari WLAN-3G: valutazione delle caratteristiche e prestazioni di protocolli ed architetture.

    Get PDF
    Studio ed analisi dei protocolli di autenticazione per l'interworking delle reti 3G e WLAN. Dopo aver analizzato l'architettura di rete e i protocolli giĂ  standardizzati, vengono evidenziate lacune e difetti e i tentativi in letteratura per ovviare a questi inconvenienti. Viene anche proposto un possibile protocollo che supporti la maggior parte delle caratteristiche necessarie per un buon funzionamento
    corecore