126 research outputs found
A New Router Certification Authority Protocol For Securing Mobile Internet Protocol Version 6
Protokol Internet Bergerak versi 6 (IPv6 Bergerak) telah dicadangkan sebagai
satu protokol piawai untuk memberikan mobility dalam Rangkaian Generasi
Seterusnya.
Mobile Internet Protocol version 6 (Mobile IPv6) has been proposed as a
standard protocol to provide mobility in Next Generation Networks
Internet Authentication for Remote Access
It is expected that future IP devices will employ a variety of
different network access technologies to gain ubiquitous
connectivity. Currently there are no authentication protocols
available that are lightweight, can be carried over arbitrary
access networks, and are flexible enough to be re-used in the
many different contexts that are likely to arise in future
Internet remote access. Furthermore, existing access procedures
need to be enhanced to offer protection against
Denial-of-Service (DoS) attacks, and do not provide
non-repudiation. In addition to being limited to specific
access media, some of these protocols are limited to specific
network topologies and are not scalable.
This thesis reviews the authentication infrastructure
challenges for future Internet remote access supporting
ubiquitous client mobility, and proposes a series of solutions
obtained by adapting and reinforcing security techniques
arising from a variety of different sources. The focus is on
entity authentication protocols that can be carried both by the
IETF PANA authentication carrier and by the EAP mechanisms, and
possibly making use of an AAA infrastructure. The core idea is
to adapt authentication protocols arising from the mobile
telecommunications sphere to Internet remote access. A proposal
is also given for Internet access using a public key based
authentication protocol. The subsequent security analysis of
the proposed authentication protocols covers a variety of
aspects, including: key freshness, DoS-resistance, and
"false-entity-in-the-middle" attacks, in addition to identity
privacy of users accessing the Internet via mobile devices.
This work aims primarily at contributing to ongoing research on
the authentication infrastructure for the Internet remote
access environment, and at reviewing and adapting
authentication solutions implemented in other spheres, for
instance in mobile telecommunications systems, for use in
Internet remote access networks supporting ubiquitous mobilit
Description and Experience of the Clinical Testbeds
This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of
the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies
in use at these sites after 18 months of the Project. It also provides an interim description of early experiences with
deployment and usage of these applications, components and technologies, and their clinical service impact
Security Analysis of the Evolved Packet Core for LTE Networks
Originally cellular networks handled calls and short messages only. Today, this has been extended to handle packet data services. However now the world is moving towards an entirely IP based mobile service based on LTE and the Evolved Packet Core. Security becomes even more important than before. Cellular networks will be using the same technology that runs the Internet, which could leave them open to a range of threats from the air interface side of the network, especially with the popularity of smart phones and USB "Mobile Broadband" modems. This thesis investigated a range of network protocols used in the Evolved Packet Core, as well as the possibility of attacks against these networks and their protocols and whether such attacks can be achieved, especially from cheap handheld devices. Further this thesis presents results showing that these network protocols are free from serious flaws in their specification
User Identity Issues in Mashups for Learning Experiences using IMS Learning Design
The combination of services that provide personal information in technologies such as educational mashups brings some issues in the management of users' identity and authorization. This article presents a scenario based on the fact that an IMS LD server requires information relevant to each learner, and this information is provided by external services. This scenario allows to describe the problems of user correspondence, authenticated data retrieval, and remote account creation; a solution using technologies currently available is provided for each, as well as recommendations to take into account in similar scenarios.This work has been partially funded by the Project Learn3 (TIN2008-05163/TSI) from the Plan Nacional I+D+I, the Spanish National Project FLEXO (TSI-020301-2008-19,www.ines.org.es/flexo) and ”Investigación y Desarrollo de Tecnologías para el e-Learning en la Comunidad de Madrid” funded by the Madrid Regional Government under grant No. S2009/TIC-1650.Publicad
Recommended from our members
A Unified Wormhole Attack Detection Framework for Mobile Ad hoc Networks
The Internet is experiencing an evolution towards a ubiquitous network paradigm, via the so-called internet-of-things (IoT), where small wireless computing devices like sensors and actuators are integrated into daily activities. Simultaneously, infrastructure-less systems such as mobile ad hoc networks (MANET) are gaining popularity since they provide the possibility for devices in wireless sensor networks or vehicular ad hoc networks to share measured and monitored information without having to be connected to a base station. While MANETs offer many advantages, including self-configurability and application in rural areas which lack network infrastructure, they also present major challenges especially in regard to routing security. In a highly dynamic MANET, where nodes arbitrarily join and leave the network, it is difficult to ensure that nodes are trustworthy for multi-hop routing. Wormhole attacks belong to most severe routing threats because they are able to disrupt a major part of the network traffic, while concomitantly being extremely difficult to detect.
This thesis presents a new unified wormhole attack detection framework which is effective for all known wormhole types, alongside incurring low false positive rates, network loads and computational time, for a variety of diverse MANET scenarios. The framework makes three original technical contributions: i) a new accurate wormhole detection algorithm based on packet traversal time and hop count analysis (TTHCA) which identifies infected routes, ii) an enhanced, dynamic traversal time per hop analysis (TTpHA) detection model which is adaptable to node radio range fluctuations, and iii) a method for automatically detecting time measurement tampering in both TTHCA and TTpHA.
The thesis findings indicate that this new wormhole detection framework provides significant performance improvements compared to other existing solutions by accurately, efficiently and robustly detecting all wormhole variants under a wide range of network conditions
Tablets report
In January 2014, the Government of Malta launched the ‘One Tablet per Child’ pilot
project whose aim is to foresee the introduction of computer tablets in primary
schools. An expression of interest was also published in order to test different types
of hardware and software solutions with the aim of collecting feedback from
educators and students.
As part of this initiative, the Faculty of Information and Communication Technology
was requested to assist. In fact, an inter-departmental team was setup made up of
academics from the Department of Intelligent Computer Systems and the
Department of Computer Information Systems. These academics were entrusted
with the task of analyzing the three major tablet platforms in order to create a
coherent and impartial analysis, which can help during the selection of the ultimate
platform. The result of this exercise is this document, which was presented to the
committee responsible for the tablets project.
Throughout this document, one can find a thorough discussion pertaining the
positive and negative aspects of each platform; be it Android, iOS or Microsoft.
Whilst praising the most positive features of each platform, the document also
highlights the issues, which might arise when developing content for these operating
systems (OSs) and the weaknesses, which currently exist. We also examined issues,
which might arise when using these platforms. In particular, our analysis also takes
into consideration the fact that the usage will happen in a primary classroom setting
and thus, additional issues such as sturdiness of the device had to be considered.
Even though we mentioned some examples, we did not really go into the merits of
particular devices because the market is so fragmented that it would have been
impossible to pinpoint specific models or brands. Being a highly volatile sector
means that the information presented in this document can be considered correct at
the time of writing however we are expecting major changes in the coming months
which will definitely change the way in which we interact with computers forever.
The document is well suited to help the committee get abreast with the latest
offerings and future potential of each platform in order to allow them to take an
informed decision. A decision, which will have a long lasting effect on the eventual
success of the project and the ultimate wellbeing of our children.peer-reviewe
An analyzing process on wireless protection criteria focusing on (WPA) within computer network security
Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs
- …