3,649 research outputs found
Device-Based Isolation for Securing Cryptographic Keys
In this work, we describe an eective device-based isolation
approach for achieving data security. Device-based isolation
leverages the proliferation of personal computing devices to
provide strong run-time guarantees for the condentiality of
secrets. To demonstrate our isolation approach, we show its
use in protecting the secrecy of highly sensitive data that
is crucial to security operations, such as cryptographic keys
used for decrypting ciphertext or signing digital signatures.
Private key is usually encrypted when not used, however,
when being used, the plaintext key is loaded into the memory
of the host for access. In our threat model, the host may
be compromised by attackers, and thus the condentiality of
the host memory cannot be preserved. We present a novel
and practical solution and its prototype called DataGuard to
protect the secrecy of the highly sensitive data through the
storage isolation and secure tunneling enabled by a mobile
handheld device. DataGuard can be deployed for the key
protection of individuals or organizations
Impact of Mobile and Wireless Technology on Healthcare Delivery services
Modern healthcare delivery services embrace the use of leading edge technologies and new
scientific discoveries to enable better cures for diseases and better means to enable early
detection of most life-threatening diseases. The healthcare industry is finding itself in a
state of turbulence and flux. The major innovations lie with the use of information
technologies and particularly, the adoption of mobile and wireless applications in
healthcare delivery [1]. Wireless devices are becoming increasingly popular across the
healthcare field, enabling caregivers to review patient records and test results, enter
diagnosis information during patient visits and consult drug formularies, all without the
need for a wired network connection [2]. A pioneering medical-grade, wireless
infrastructure supports complete mobility throughout the full continuum of healthcare
delivery. It facilitates the accurate collection and the immediate dissemination of patient
information to physicians and other healthcare care professionals at the time of clinical
decision-making, thereby ensuring timely, safe, and effective patient care. This paper
investigates the wireless technologies that can be used for medical applications, and the
effectiveness of such wireless solutions in a healthcare environment. It discusses challenges
encountered; and concludes by providing recommendations on policies and standards for
the use of such technologies within hospitals
Development of PAN (personal area network) for Mobile Robot Using Bluetooth Transceiver
In recent years, wireless applications using radio frequency (RF) have been rapidly evolving in personal computing and communications devices. Bluetooth technology was created to replace the cables used on mobile devices. Bluetooth is an open specification and encompasses a simple low-cost, low power solution for integration into devices. This research work aim was to provide a PAN (personal area network) for computer based mobile robot that supports real-time control of four mobile robots from a host mobile robot. With ad hoc topology, mobile robots may request and establish a connection when it is within the range or terminated the connection when it leaves the area. A system that contains both hardware and software is designed to enable the robots to participate in multi-agent robotics system (MARS). Computer based mobile robot provide operating system that enabled development of wireless connection via IP address
Securing the Internet of Things Infrastructure - Standards and Techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
TechNews digests: Jan - Nov 2008
TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
Realising context-sensitive mobile messaging
Mobile technologies aim to assist people as they move from place to place going about their daily work and social routines. Established and very popular mobile technologies include short-text messages and multimedia messages with newer growing technologies including Bluetooth mobile data transfer protocols and mobile web access.Here we present new work which combines all of the above technologies to fulfil some of the predictions for future context aware messaging. We present a context sensitive mobile messaging system which derives context in the form of physical locations through location sensing and the co-location of people through Bluetooth familiarity
Bi-Directional Information Exchange with Computing Handheld Devices
The Bi-Directional Information Exchange with Handheld Computing Devicesz\u27 project introduces two new concepts: dynamic digital receipts and personal data warehousing. Dynamic digital receipts means digitalizing paper transactions generated from points of sale. Personal data warehousing means organizing and collecting data for later viewing and analysis. The consumer will be able to use a handheld device such as a cell phone or PDA to receive and store a transaction in XML format. Later on, the user can upload the receipt through a web application to a personal data warehouse for storage or management of receipts. The web interface also allows users to export the receipts to money management software. The digital receipt is transferred from the point of sale to the handheld device using Bluetooth technology. The implementation of the digital receipt concept will allow users to manage their receipts and store them neatly without restrictions on manipulating their own data
Smart card authentication for mobile devices
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices
Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security
In this paper we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realizing they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies
- …