13 research outputs found

    A survey on wireless mesh networks: architecture, specifications and challenges

    Get PDF
    Wireless Mesh Network (WMN) is an emerging and practical wireless solution for metropolitan area networks to provide community broadband Internet access services by organizing and configuring nodes in the network efficiently and dynamically. In this survey, the concept of wireless mesh network has been described briefly as an emerging technology to provide Internet in large areas. Accordingly, the architecture of these networks has been explained regarding to the client meshing backbone, characteristics and advantages of wireless mesh networks have been specified, and the performance of different layers in during communication in these networks has been described. In addition, due to the performance of wireless mesh networks various issues and challenges are raised. Thus, these challenges have been specified in this paper and related research areas were proposed to solve defined challenges

    Privacy issues and protection in secure data outsourcing

    Get PDF
    Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data

    Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing

    Get PDF
    Abstract-Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device to host the delivery of mobile applications. However, this technology introduces some opportunities as new computing concept, several challenges, including security and privacy are raised from the adoption of this IT paradigm. Authentication plays an important role to mitigate security and privacy issue in the mobile cloud computing. Even some authentication algorithms are proposed for mobile cloud computing, but most of these algorithms designed for traditional computing models, and are not using cloud capabilities. In mobile cloud computing, we access to pooled computation resources and applying more complicated authentication schemes is possible. Using different authentication factors, which is called multifactor authentication algorithms, has been proposed for various areas. In this paper, feasibility of implementation of different kinds of multi-factor authentication protocols are discussed. Furthermore, the security and privacy of these algorithms are analyzed. Finally, some future directions are recommended

    Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

    Get PDF
    The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms

    Fountainhead for peace

    Get PDF
    The emergence of an ‘African hub’ for dispute resolution at the University of Stellenbosch Business School symbolises a new, transformative path for the university, writes TERRY BELL

    The effective factors on user acceptance in mobile business intelligence

    No full text
    Mobile business intelligence used for business intelligence mobile service applications increasingly. According to Gartner (2011), global smartphone sales had arrived at 630 million in 2012, and are supposed to reach 1,105 million items in 2015. As a result, business intelligence users not only rely on desktop computers, while they as well want mobile access to joint and used data. Nevertheless, few studies have been consummate on mobile business intelligence services and the user acceptance rate of mobile BI is still moderately low. For these reasons, the current article centred on the significant of the factors and levels of mobile business intelligence user acceptance that affect the mobile business intelligence user Acceptance. The conceptual model planned and data collected between mobile business intelligence users and quantitative method used. The collected data, analysed by SPSS software. The result of data analysis exposed that how factors such as organization climate, information quality, system quality, society effect and individual effect were influenced user acceptance in mobile business intelligence applications.</p

    Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization

    No full text
    A Wireless Sensor Network (WSN) is a collection of sensor nodes that dynamically self-organizes themselves into a wireless network with- out the utilization of any pre-existing infrastructure. One of the major problems in WSNs is the energy consumption, whereby the energy will be caused to increase or reduce the network’s lifetime. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the Fuzzy Ant Colony Optimization Routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulation2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decrease the number of routing request packets and increase the network’s lifetime in comparison with the orig- inal AODV

    Security analysis method of recognition-based graphical password

    No full text
    One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented
    corecore