2 research outputs found

    Packet Construction for Secure Conference Call Request in Ad Hoc Network Systems

    No full text
    [[abstract]]In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one’s own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Furthermore, due to the mobility of nodes in an ad hoc network environment, it is likely that some nodes quit or join during the operation of this conference. To solve these problems, we employ an information exchange table for each participant node in order to manage a secure conference call in an ad hoc network system. In addition, our scheme employs only one cryptographic algorithm of the secret-key system. The extraction of the secure sub-packets associated with each intended receiver is protected on the basis of the Diffie–Hellman key exchange protocol with the trusted public-key exchange. Therefore, the subsequent message recovery is successfully accomplished. This provides a new and feasible solution for a secure conference call in an ad hoc network system

    Evaluating the effectiveness of mobile telecommunication services in Durban and Lagos.

    Get PDF
    Thesis (M.Com.)-University of KwaZulu-Natal, Westville, 2011.Telecommunication includes voice, video and internet communication services. Thus, mobile telecommunication services involve voice communication, video streaming, graphics and television services at high speed. Technology development in mobile telecommunication has enabled users to exchange data using cell phones, laptops and other telecommunication devices. More so, understanding the concept of user experience is very important in the context of provision of mobile telecommunication services. This research will evaluate the effectiveness of mobile telecommunication services in Durban, South Africa and Lagos, Nigeria amongst first-year IT students of the University of KwaZulu-Natal and Lagos State University. The research is focused on the actual experience and perceptions of first-year IT students. The study will examine the factors that influence first-year IT students' judgment of the quality of mobile telecommunication services. It will also access the impact of quality of mobile telecommunication services on the loyalty of first-year IT students towards their network operator. However, Technology Acceptance Model (TAM) is the theory adopted for this research, which explains how attitude of users determine the intention to use technology and the intention eventually influences the overall use of such technology. The objectives of this research highlight opportunities associated with understanding first-year IT students' experiences and perceptions of mobile telecommunication services in UKZN, Durban and LASU, Lagos. Other opportunities include giving an insight into the operations of network providers, determine the quality of mobile telecommunication services and understanding the impact of mobile telecommunication services on students in UKZN and LASU. Another significance of this study allows network providers to understand students' behaviour and to respond to their preferences
    corecore