126 research outputs found

    A New Router Certification Authority Protocol For Securing Mobile Internet Protocol Version 6

    Get PDF
    Protokol Internet Bergerak versi 6 (IPv6 Bergerak) telah dicadangkan sebagai satu protokol piawai untuk memberikan mobility dalam Rangkaian Generasi Seterusnya. Mobile Internet Protocol version 6 (Mobile IPv6) has been proposed as a standard protocol to provide mobility in Next Generation Networks

    Internet Authentication for Remote Access

    Get PDF
    It is expected that future IP devices will employ a variety of different network access technologies to gain ubiquitous connectivity. Currently there are no authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be re-used in the many different contexts that are likely to arise in future Internet remote access. Furthermore, existing access procedures need to be enhanced to offer protection against Denial-of-Service (DoS) attacks, and do not provide non-repudiation. In addition to being limited to specific access media, some of these protocols are limited to specific network topologies and are not scalable. This thesis reviews the authentication infrastructure challenges for future Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from a variety of different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed authentication protocols covers a variety of aspects, including: key freshness, DoS-resistance, and "false-entity-in-the-middle" attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This work aims primarily at contributing to ongoing research on the authentication infrastructure for the Internet remote access environment, and at reviewing and adapting authentication solutions implemented in other spheres, for instance in mobile telecommunications systems, for use in Internet remote access networks supporting ubiquitous mobilit

    Description and Experience of the Clinical Testbeds

    Get PDF
    This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these sites after 18 months of the Project. It also provides an interim description of early experiences with deployment and usage of these applications, components and technologies, and their clinical service impact

    Security Analysis of the Evolved Packet Core for LTE Networks

    Get PDF
    Originally cellular networks handled calls and short messages only. Today, this has been extended to handle packet data services. However now the world is moving towards an entirely IP based mobile service based on LTE and the Evolved Packet Core. Security becomes even more important than before. Cellular networks will be using the same technology that runs the Internet, which could leave them open to a range of threats from the air interface side of the network, especially with the popularity of smart phones and USB "Mobile Broadband" modems. This thesis investigated a range of network protocols used in the Evolved Packet Core, as well as the possibility of attacks against these networks and their protocols and whether such attacks can be achieved, especially from cheap handheld devices. Further this thesis presents results showing that these network protocols are free from serious flaws in their specification

    User Identity Issues in Mashups for Learning Experiences using IMS Learning Design

    Get PDF
    The combination of services that provide personal information in technologies such as educational mashups brings some issues in the management of users' identity and authorization. This article presents a scenario based on the fact that an IMS LD server requires information relevant to each learner, and this information is provided by external services. This scenario allows to describe the problems of user correspondence, authenticated data retrieval, and remote account creation; a solution using technologies currently available is provided for each, as well as recommendations to take into account in similar scenarios.This work has been partially funded by the Project Learn3 (TIN2008-05163/TSI) from the Plan Nacional I+D+I, the Spanish National Project FLEXO (TSI-020301-2008-19,www.ines.org.es/flexo) and ”Investigación y Desarrollo de Tecnologías para el e-Learning en la Comunidad de Madrid” funded by the Madrid Regional Government under grant No. S2009/TIC-1650.Publicad

    Tablets report

    Get PDF
    In January 2014, the Government of Malta launched the ‘One Tablet per Child’ pilot project whose aim is to foresee the introduction of computer tablets in primary schools. An expression of interest was also published in order to test different types of hardware and software solutions with the aim of collecting feedback from educators and students. As part of this initiative, the Faculty of Information and Communication Technology was requested to assist. In fact, an inter-departmental team was setup made up of academics from the Department of Intelligent Computer Systems and the Department of Computer Information Systems. These academics were entrusted with the task of analyzing the three major tablet platforms in order to create a coherent and impartial analysis, which can help during the selection of the ultimate platform. The result of this exercise is this document, which was presented to the committee responsible for the tablets project. Throughout this document, one can find a thorough discussion pertaining the positive and negative aspects of each platform; be it Android, iOS or Microsoft. Whilst praising the most positive features of each platform, the document also highlights the issues, which might arise when developing content for these operating systems (OSs) and the weaknesses, which currently exist. We also examined issues, which might arise when using these platforms. In particular, our analysis also takes into consideration the fact that the usage will happen in a primary classroom setting and thus, additional issues such as sturdiness of the device had to be considered. Even though we mentioned some examples, we did not really go into the merits of particular devices because the market is so fragmented that it would have been impossible to pinpoint specific models or brands. Being a highly volatile sector means that the information presented in this document can be considered correct at the time of writing however we are expecting major changes in the coming months which will definitely change the way in which we interact with computers forever. The document is well suited to help the committee get abreast with the latest offerings and future potential of each platform in order to allow them to take an informed decision. A decision, which will have a long lasting effect on the eventual success of the project and the ultimate wellbeing of our children.peer-reviewe

    An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

    Get PDF
    Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs
    corecore