3,649 research outputs found

    Device-Based Isolation for Securing Cryptographic Keys

    Get PDF
    In this work, we describe an eective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for the condentiality of secrets. To demonstrate our isolation approach, we show its use in protecting the secrecy of highly sensitive data that is crucial to security operations, such as cryptographic keys used for decrypting ciphertext or signing digital signatures. Private key is usually encrypted when not used, however, when being used, the plaintext key is loaded into the memory of the host for access. In our threat model, the host may be compromised by attackers, and thus the condentiality of the host memory cannot be preserved. We present a novel and practical solution and its prototype called DataGuard to protect the secrecy of the highly sensitive data through the storage isolation and secure tunneling enabled by a mobile handheld device. DataGuard can be deployed for the key protection of individuals or organizations

    Impact of Mobile and Wireless Technology on Healthcare Delivery services

    Get PDF
    Modern healthcare delivery services embrace the use of leading edge technologies and new scientific discoveries to enable better cures for diseases and better means to enable early detection of most life-threatening diseases. The healthcare industry is finding itself in a state of turbulence and flux. The major innovations lie with the use of information technologies and particularly, the adoption of mobile and wireless applications in healthcare delivery [1]. Wireless devices are becoming increasingly popular across the healthcare field, enabling caregivers to review patient records and test results, enter diagnosis information during patient visits and consult drug formularies, all without the need for a wired network connection [2]. A pioneering medical-grade, wireless infrastructure supports complete mobility throughout the full continuum of healthcare delivery. It facilitates the accurate collection and the immediate dissemination of patient information to physicians and other healthcare care professionals at the time of clinical decision-making, thereby ensuring timely, safe, and effective patient care. This paper investigates the wireless technologies that can be used for medical applications, and the effectiveness of such wireless solutions in a healthcare environment. It discusses challenges encountered; and concludes by providing recommendations on policies and standards for the use of such technologies within hospitals

    Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver

    Get PDF
    In recent years, wireless applications using radio frequency (RF) have been rapidly evolving in personal computing and communications devices. Bluetooth technology was created to replace the cables used on mobile devices. Bluetooth is an open specification and encompasses a simple low-cost, low power solution for integration into devices. This research work aim was to provide a PAN (personal area network) for computer based mobile robot that supports real-time control of four mobile robots from a host mobile robot. With ad hoc topology, mobile robots may request and establish a connection when it is within the range or terminated the connection when it leaves the area. A system that contains both hardware and software is designed to enable the robots to participate in multi-agent robotics system (MARS). Computer based mobile robot provide operating system that enabled development of wireless connection via IP address

    Securing the Internet of Things Infrastructure - Standards and Techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed

    TechNews digests: Jan - Nov 2008

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month

    Realising context-sensitive mobile messaging

    Get PDF
    Mobile technologies aim to assist people as they move from place to place going about their daily work and social routines. Established and very popular mobile technologies include short-text messages and multimedia messages with newer growing technologies including Bluetooth mobile data transfer protocols and mobile web access.Here we present new work which combines all of the above technologies to fulfil some of the predictions for future context aware messaging. We present a context sensitive mobile messaging system which derives context in the form of physical locations through location sensing and the co-location of people through Bluetooth familiarity

    Bi-Directional Information Exchange with Computing Handheld Devices

    Get PDF
    The Bi-Directional Information Exchange with Handheld Computing Devicesz\u27 project introduces two new concepts: dynamic digital receipts and personal data warehousing. Dynamic digital receipts means digitalizing paper transactions generated from points of sale. Personal data warehousing means organizing and collecting data for later viewing and analysis. The consumer will be able to use a handheld device such as a cell phone or PDA to receive and store a transaction in XML format. Later on, the user can upload the receipt through a web application to a personal data warehouse for storage or management of receipts. The web interface also allows users to export the receipts to money management software. The digital receipt is transferred from the point of sale to the handheld device using Bluetooth technology. The implementation of the digital receipt concept will allow users to manage their receipts and store them neatly without restrictions on manipulating their own data

    Smart card authentication for mobile devices

    Get PDF
    While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices

    Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security

    Get PDF
    In this paper we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realizing they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies
    corecore