23,298 research outputs found

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations

    Engineering at San Jose State University, Winter 2014

    Get PDF
    https://scholarworks.sjsu.edu/engr_news/1012/thumbnail.jp

    Intelligent Campus: Coming to a School Near You

    Get PDF

    Network layer access control for context-aware IPv6 applications

    Get PDF
    As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements

    Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications

    Get PDF
    As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module

    An Advanced Home ElderCare Service

    Get PDF
    With the increase of welfare cost all over the developed world, there is a need to resort to new technologies that could help reduce this enormous cost and provide some quality eldercare services. This paper presents a middleware-level solution that integrates monitoring and emergency detection solutions with networking solutions. The proposed system enables efficient integration between a variety of sensors and actuators deployed at home for emergency detection and provides a framework for creating and managing rescue teams willing to assist elders in case of emergency situations. A prototype of the proposed system was designed and implemented. Results were obtained from both computer simulations and a real-network testbed. These results show that the proposed system can help overcome some of the current problems and help reduce the enormous cost of eldercare service

    How Mobile Devices are Transforming Disaster Relief and Public Safety

    Get PDF
    With its growing usage, mobile technology is greatly improving disaster relief and public safety efforts. Countries around the world face threats from natural disasters, climate change, civil unrest, terrorist attacks, and criminal activities, among others. Mobile devices, tablets, and smart phones enable emergency providers and the general public to manage these challenges and mitigate public safety concerns.In this paper, part of the Brookings Mobile Economy Project, we focus on how mobile technology provides an early warning system, aids in emergency coordination, and improves public communications. In particular, we review how mobile devices assist with public safety, disaster planning, and crisis response. We explain how these devices are instrumental in the design and functioning of integrated, multi-layered communications networks. We demonstrate how they have helped save lives and ameliorate human suffering throughout the world
    • 

    corecore