37 research outputs found

    Imparting a Quality Service and Traffic analysis for Monitoring Information in Mobile Wireless Networks

    Get PDF
    Privacy and security have emerged as an important research issue in mobile Networks wireless communication, Mobile device based data scattering applications that use these abilities. This paper proposes TurfCast, a novel data spread administration that specifically communicates data specifically "turfs," conceptual coherent spaces in which beneficiaries are arranged. Such turfs can be transient or spatial in view of recipients' waiting time or physical zones, individually. TurfCast has numerous applications, for example, electronic nearness promoting and mobile long range interpersonal communication. The individuals who can't get data sufficiently quick get none by any stretch of the imagination, regardless of the possibility that they wait close to the supporter. Numerous secrecy improving strategies have been proposed in view of packet encryption to ensure the communication obscurity of mobile systems. To exhibit how to find the communication designs without unscrambling the caught packets, we show TurfCast. It works latently to perform traffic investigation in view of statistical qualities of caught crude traffic. These are fit for finding the sources, the goals, and the conclusion to-end communication relations. Exact analysiss show that accomplishes great precision in uncovering the shrouded traffic designs

    Securing mobile services

    Get PDF
    This paper reports on some initial findings of the EU IST SEINIT project with respect to the security of end-to-end services over the wireless access and fixed network and captures the state of the art in secure mobile services infrastructures

    SEINIT Security for Heterogeneous Mobile Network Services

    Get PDF
    This paper presents a model for securing mobile services using heterogeneous access networks, and implementing sample solutions using this framework. This is a project that is defining new security models and policies to address the new issues of the pervasive computing world. The security models and policies are implemented over IPv6 infrastructures to cover various business cases and assessed against real life scenarios. SEINIT is developing a trusted and dependable security framework with the end-user as the focus

    New Threats and Innovative Protection Methods in Wireless Transmission Systems, Journal of Telecommunications and Information Technology, 2014, nr 3

    Get PDF
    Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities. Such technologies and transmission methods as: Near Field Communication (NFC), Visible Light Communication (VLC), handover, mesh networks, 5G cellular network, mobile IPv6, beamforming, cooperative beamforming, Multiple Input Multiple Output (MIMO), Orthogonal Frequency Division Multiple Access (OFDMA), transmission in Extra High Frequency (EHF) band are very important from the security point of view. In order to preserve high level of security one needs to identify, analyse and classify distinctive sets of threats and vulnerabilities as well as some emerging data protection opportunities related to innovative wireless transmission methods and technologies. This identification, analysis and classification is a main purpose of the paper. It will focus on cryptography in wireless systems, security vs. energy tradeoffs, physical layer security. For example, common problems related to cryptography may be solved with a use of physical layer security. Data confidentiality may be fulfilled with a use of beamforming and jamming, authentication may be performed with a use of out-of-band authentication model

    Authentication and key establishment in wireless networks

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Practical privacy enhancing technologies for mobile systems

    Get PDF
    Mobile computers and handheld devices can be used today to connect to services available on the Internet. One of the predominant technologies in this respect for wireless Internet connection is the IEEE 802.11 family of WLAN standards. In many countries, WLAN access can be considered ubiquitous; there is a hotspot available almost anywhere. Unfortunately, the convenience provided by wireless Internet access has many privacy tradeoffs that are not obvious to mobile computer users. In this thesis, we investigate the lack of privacy of mobile computer users, and propose practical enhancements to increase the privacy of these users. We show how explicit information related to the users' identity leaks on all layers of the protocol stack. Even before an IP address is configured, the mobile computer may have already leaked their affiliation and other details to the local network as the WLAN interface openly broadcasts the networks that the user has visited. Free services that require authentication or provide personalization, such as online social networks, instant messengers, or web stores, all leak the user's identity. All this information, and much more, is available to a local passive observer using a mobile computer. In addition to a systematic analysis of privacy leaks, we have proposed four complementary privacy protection mechanisms. The main design guidelines for the mechanisms have been deployability and the introduction of minimal changes to user experience. More specifically, we mitigate privacy problems introduced by the standard WLAN access point discovery by designing a privacy-preserving access-point discovery protocol, show how a mobility management protocol can be used to protect privacy, and how leaks on all layers of the stack can be reduced by network location awareness and protocol stack virtualization. These practical technologies can be used in designing a privacy-preserving mobile system or can be retrofitted to current systems

    Building Security Protocols Against Powerful Adversaries

    Get PDF
    As our sensitive data is increasingly carried over the Internet and stored remotely, security in communications becomes a fundamental requirement. Yet, today's security practices are designed around assumptions the validity of which is being challenged. In this thesis we design new security mechanisms for certain scenarios where traditional security assumptions do not hold. First, we design secret-agreement protocols for wireless networks, where the security of the secrets does not depend on assumptions about the computational limitations of adversaries. Our protocols leverage intrinsic characteristics of the wireless to enable nodes to agree on common pairwise secrets that are secure against computationally unconstrained adversaries. Through testbed and simulation experimentation, we show that it is feasible in practice to create thousands of secret bits per second. Second, we propose a traffic anonymization scheme for wireless networks. Our protocol aims in providing anonymity in a fashion similar to Tor - yet being resilient to computationally unbounded adversaries - by exploiting the security properties of our secret-agreement. Our analysis and simulation results indicate that our scheme can offer a level of anonymity comparable to the level of anonymity that Tor does. Third, we design a lightweight data encryption protocol for protecting against computationally powerful adversaries in wireless sensor networks. Our protocol aims in increasing the inherent weak security that network coding naturally offers, at a low extra overhead. Our extensive simulation results demonstrate the additional security benefits of our approach. Finally, we present a steganographic mechanism for secret message exchange over untrustworthy messaging service providers. Our scheme masks secret messages into innocuous texts, aiming in hiding the fact that secret message exchange is taking place. Our results indicate that our schemes succeeds in communicating hidden information at non-negligible rates

    Exploring Cross-Layer Dependencies in Congested Wireless Ad Hoc Networks

    Get PDF
    Steen, M.R. van [Promotor]Voulgaris, S. [Copromotor
    corecore