Filters








47,013 Hits in 4.0 sec

A proposed architecture for secure two-party mobile payment

J. E. Rice, Y. Zhu
2009 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing  
In this paper we propose a new secured architecture for two-party mobile payments, e.g. mobile banking.  ...  The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems.  ...  In this paper we propose a a new secured architecture for mobile banking/payments.  ... 
doi:10.1109/pacrim.2009.5291393 fatcat:iukuwz7uqrgu3mack4fy3fuoom

A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems

I.F. Akyildiz, S. Mohanty, Jiang Xie
2005 IEEE Communications Magazine  
Architecture for Next-Generation Wireless Systems Architectures requiring direct SLAs among different providers are not feasible because of the reasons mentioned earlier.  ...  The working principle of this third-party-based security architecture is as follows.  ... 
doi:10.1109/mcom.2005.1452832 fatcat:qv3o5ttmpzai5l5pfqpxx4ixky

Issues toward Networks Architecture Security for LTE and LTE-A Networks

Jin Wang, Zhongqi Zhang, Yongjun Ren, Bin Li, Jeong-Uk Kim
2014 International Journal of Security and Its Applications  
Second, LTE security architecture is shown as well. Third, some drawbacks in LTE security framework are discussed in Section 4.  ...  The Long Term Evolution (LTE) system has been specified by the Third Generation Partnership Project (3GPP) on the way towards fourth-generation (4G) mobile to ensure 3GPP keeping the dominance of the cellular  ...  Acknowledgments This paper is a revised and expanded version of a paper entitled "A Survey about Location-Based Routing Protocols for Wireless Sensor Network" presented at CIA 2014, Angeles City (Clark  ... 
doi:10.14257/ijsia.2014.8.4.02 fatcat:y4rm4gpvdjhifkwp4hn5lqu5na

Building robust m-commerce payment system on offline wireless network

N. Chitra Kiran, G. Narendra Kumar
2011 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS)  
The proposed system highlights a novel approach for building a secure, scalable, and flexible e-payment systems in the distributed scenario of wireless adhoc network in offline mode of communication for  ...  The proposed system uses Simple Public Key Infrastructure for providing the security in payment processes.  ...  The proposed system highlights a very flexible architecture for secure transaction in wireless mobile adhoc network.  ... 
doi:10.1109/ants.2011.6163664 dblp:conf/IEEEants/NK11 fatcat:nkksfx2vhfauhpfotzcyxmjsoy

Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis

Noureddine Boudriga, Mohammad S. Obaidat, Faouzi Zarai
2008 Computer Communications  
In this article, first we study the design of intelligent services in wireless fourth generation networks.  ...  Wireless 4G network should offer a wide use of information processing techniques, efficient manipulation of the network resources, and reuse of network functions.  ...  A very high-data rate is required to realize this and this data rate is well beyond the capability of the third generation (3G) wireless systems.  ... 
doi:10.1016/j.comcom.2008.05.003 fatcat:cmoufxw3qfhfbjj3eie5vdwuie

A Novel Privacy Preservation Schemes in Wireless Network

Mayur R. Tawalare, Sonali Nimbhorkar
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
As the time two tier wireless sensor network have some advantages related to the security that is the major concern in the two tier architecture.  ...  There is an some fundamental architectures that one from compromising a sensor and server and another is to compromising a sensor, server and a storage capacity nodes between the two tier architecture  ...  SYSTEM ARCHITECTURE AND DESIGN GOALS This section can describes the system architecture and major design goals of the paper A.  ... 
doi:10.23956/ijarcsse/v7i4/0112 fatcat:guz45kwrhnf57lxelo7woce2gi

Guest Editorial Recent Advances in Managing Enterprise Network Services

R. Boutaba, G. Jakobson, L. Lewis, P. Ray, A. Leon-Garcia
2005 IEEE Journal on Selected Areas in Communications  
The third paper, "Service Management in Secure and QoS-Aware Wireless Enterprise Networks," brings the perspective of managing network services in a wireless environment that is becoming more and more  ...  The third paper in this category, "Quanta Data Storage: An Information Processing and Transportation Architecture for Storage Area Networks," presents a new architecture for storage area networks that  ... 
doi:10.1109/jsac.2005.854117 fatcat:spxlfeu7drfhfmp3patkb2cwqi

A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks

M. Balaganesh, D.Balagowri D.Balagowri, P.Sathiya P.Sathiya
2015 International Journal of Computer Applications  
Wireless networking protocols square measure progressively being designed to use a user's measured channel condition.  ...  Every user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to see however resources square measure allotted to users.  ...  The scheduler-based attacks in third generation wireless networks are used for measures the quality and performance of the downlink channels in a network.  ... 
doi:10.5120/19170-0640 fatcat:wdfu3qjgarb7bhsfskqjhawna4

Wireless Communication: Evolution and Advance Wireless Communication

Rishabh Aggarwal
2018 International Journal of Sustainable Development Research  
As this paper represent the Generation of the wireless communication, the network architecture of wireless communication and the hardware and software logics evolution of the wireless communication, Network  ...  There is a evolution take place in order to get the advance technology in the wireless communication (1G to 5G).  ...  Third Generation Systems (3G) Third generation (3G) services combine high speed mobile access with Internet Protocol (IP)-based services.  ... 
doi:10.11648/j.ijsdr.20180402.12 fatcat:lvgo7oomaffzfmcpd4inukn36m

Some Security Issues of Wireless Systems [chapter]

Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
2005 Lecture Notes in Computer Science  
These systems appear under a variety of architectures including fixed networks, cellular networks, and ad hoc networks.  ...  To this we add the fact that there is a large variety of devices using different architectures, several operating systems, and diverse functionality.  ...  Acknowledgements This work was supported by a grant from the Defense Information Systems Agency (DISA), administered by Pragmatics, Inc.  ... 
doi:10.1007/11533962_35 fatcat:423qp3mqsncrxa74qdjenolige

Security for QoS assured wireless and mobile networks

M. Cesana, A. Boukerche, A. Zomaya
2010 Security and Communication Networks  
The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture for WMNs, proposes a fully distributed  ...  Whilst the wireless mesh architecture addressed in the first paper is general, in the second manuscript on Differentiated Security in WMNs, the authors target the design of secure mechanisms for IEEE 802.11s-based  ...  The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture for WMNs, proposes a fully distributed  ... 
doi:10.1002/sec.201 fatcat:nlt4di4iv5e43izj4nnty4f7bq

AN OVERVIEW OF THE ATTACKS ON LTE IN 4G: EXPLOITING THE SECURITY

Nidhi .
2017 International Journal of Advanced Research in Computer Science  
Communication in wireless provides a number of applications. Wireless communications have grown from last ten decades.  ...  In this paper we have studied various security threats on LTE system and their analysis and comparison to overcome these attacks has been done.  ...  II. 3GPP LTE SECURITY It is a standard form used for wireless communication.  ... 
doi:10.26483/ijarcs.v8i9.5150 fatcat:ocuva26jijfxxdaf7w7cuq4sim

Conveying IN into an All-IP network's service architecture

P. Moritz
2000 Proceedings 2000 IEEE Intelligent Network Workshop  
networks resulting in a need for efficient network design.  ...  Widespread wireless technologies, increasing variety of user-friendly and multimedia-enabled terminals and wider availability of open source tools for content generation has lead encouraged user-centric  ...  The 5 th generation of mobile wireless network will be a extremely amazing communication system with no restraint.  ... 
doi:10.1109/inw.2000.868195 fatcat:slfpydctvbf3famafbope7lquq

Conceptualizing a Secure Wireless Cloud

Tyson Brooks, Jerry Robinson, Lee McKnight
2012 International Journal of Cloud Computing and Services Science (IJ-CLOSER)  
We will identify a wireless cloud architecture, potential vulnerabilities and threats to a wireless cloud solution, and propose the beginnings of a wireless grid security architecture, which focuses on  ...  As a new paradigm for organizational strategic initiatives, these are the issues which prevent cloud computing and wireless grid solutions from becoming the prevalent integration for an operational system  ...  ACKNOWLEDGEMENTS The development of the Wireless Grid Innovation Testbed (WiGiT) is primarily funded by the support of the National Science Foundation (NSF) Partnership for Innovation (PFI) program grants  ... 
doi:10.11591/closer.v1i3.790 fatcat:hqlgnmrmwnanfl53kcsbxoarpy

Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks

Niharika Singh, Mandeep Singh Saini
2015 International Journal of Computer Applications  
The attacker can launch a variety of active and passive attacks. Thus security mechanism is to be defined for call security in 4G/LTE network.  ...  The proposed model will use a pre-shared key group to ensure the security during the call setup phase and will use the random table based non-predictive key exchange model for the purpose of in-call security  ...  These limitations and disadvantages have generated the need for a universal framework encompassing all wired systems without existing heterogeneous wireless in use.  ... 
doi:10.5120/20884-3644 fatcat:hfhn2rs3r5bbhgqp5iwln2m7lm
« Previous Showing results 1 — 15 out of 47,013 results