Filters








18,315 Hits in 4.7 sec

Proxy-based security protocols in networked mobile devices

M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
We detail the device-to-proxy protocol for lightweight wireless devices and the proxy-to-proxy protocol which is based on SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure  ...  A prototype system has been constructed, which allows for secure, yet efficient, access to networked, mobile devices. We present a quantitative evaluation of this system using various metrics.  ...  Developing security protocols that can handle diverse, mobile devices networked in various ways represents a major challenge.  ... 
doi:10.1145/508832.508845 fatcat:jyxubwcfcbdqbfxdyknrzplldi

Proxy-based security protocols in networked mobile devices

M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
We detail the device-to-proxy protocol for lightweight wireless devices and the proxy-to-proxy protocol which is based on SPKI/SDSI (Simple Public Key Infrastructure / Simple Distributed Security Infrastructure  ...  A prototype system has been constructed, which allows for secure, yet efficient, access to networked, mobile devices. We present a quantitative evaluation of this system using various metrics.  ...  Developing security protocols that can handle diverse, mobile devices networked in various ways represents a major challenge.  ... 
doi:10.1145/508791.508845 dblp:conf/sac/BurnsideCMMDR02 fatcat:44kwvxz6zbbo7feh7bpctdks3m

Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6

Mojtaba Alizadeh, Mazdak Zamani, Sabariah Baharun, Wan Haslina Hassan, Touraj Khodadadi
2015 Jurnal Teknologi  
Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes.  ...  In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6.  ...  Network (CSN) research group.  ... 
doi:10.11113/jt.v72.3935 fatcat:fzauzxs7tfgdhh5dwqboxtisku

Practical out-of-band authentication for mobile applications

Kapil Singh, Larry Koved
2013 Proceedings of the Industrial Track of the 13th ACM/IFIP/USENIX International Middleware Conference on - Middleware Industry '13  
Mobile devices create new opportunities and challenges for authentication.  ...  The framework allows applications to delegate authentication to an independent security service on the client that, in turn, supports an extensible range of authentication protocols.  ...  More importantly, it is very common in enterprise environments for a security proxy technology to sit between the mobile device and the network service (see Figure 1 ).  ... 
doi:10.1145/2541596.2541599 dblp:conf/middleware/SinghK13 fatcat:k3aywdt3gjfipjlhqi66gxhsaa

Automotive Proxy-Based Security Architecture for CE Device Integration [chapter]

Alexandre Bouard, Johannes Schanda, Daniel Herrscher, Claudia Eckert
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this paper, we describe a proxy-based security architecture for an on-board IP-based network allowing deep and total integration of external mobile wireless services.  ...  The proposed architecture has been integrated in an automotive IP-based communication middleware and supports security mechanisms complying with the highly demanding automotive requirements.  ...  Some of the research presented here, took place within the project SEIS -Security in Embedded IP-based Systems.  ... 
doi:10.1007/978-3-642-36660-4_5 fatcat:ncdkuxvdbzaepcntqyy7gui57e

Network based Mobility Management for Smart Homes through Proxy Mobile IP

Hyunju Munn, Kiho Lee, Ronnie D. Caytiles, Byungjoo Park
2014 International Journal of Smart Home  
His primary research interests include theory and application of mobile computing, including protocol design and performance analysis in next generation wireless/mobile networks.  ...  It is specially designed that ranges from simple remote control of lighting and windows to complex network of microcontroller based devices [2, 9] .  ...  For the purpose of network-based mobility management, the Proxy Mobile IPv6 or PMIPv6 which is an IETF standardized protocol has been introduced.  ... 
doi:10.14257/ijsh.2014.8.6.22 fatcat:qrn4qaqhefgptjkw7foa56urky

Lightweight Security for JXME-Proxied Relay Authentication

Marc Domingo-Prieto, Joan Arnedo-Moreno
2011 2011 14th International Conference on Network-Based Information Systems  
JXME is the JXTA protocols implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices.  ...  The protocol overhead has been experimentally tested in order to assess its low impact on device performance, an important requisite on limited devices.  ...  Thus, JXME was developed in order to allow mobile devices to create standalone mobile JXTA networks or to participate in a standard JXTA network using a mobile device.  ... 
doi:10.1109/nbis.2011.25 dblp:conf/nbis/Domingo-PrietoA11 fatcat:w3yqzswhmvcs5ijejstpz5zgam

Proxy-Based Adaptation for Mobile Computing [chapter]

Markus Endler, Hana Rubinsztejn, Ricardo Rocha, Vagner Sacramento
2006 The Handbook of Mobile Middleware  
They may handle communication protocol issues, data transmission and encoding, device-specific customizations, handover and mobility management, security and authentication, recovery from disconnection  ...  Thus, in this chapter we will mainly discuss proxy-based architectures for infra-structured mobile networks.  ...  or the current mobile network conditions.  ... 
doi:10.1201/9781420013153.ch13 fatcat:ozetiwhbhfhhxgfmruywrq7rje

Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones [chapter]

Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010 Lecture Notes in Computer Science  
We go on to discuss how relay attack countermeasures using device location could be used in the mobile environment.  ...  Peer-to-peer applications for mobile devices are receiving increased interest and in some cases these services are relying on NFC communication.  ...  Phone-B and Proxy-A Phone-B and Proxy-A were realised on two Nokia 6131 NFC mobile phones, based on Symbian S40 3 rd Edition FP1 platform.  ... 
doi:10.1007/978-3-642-16822-2_4 fatcat:s5uubfduczednfzavflmr5xgre

Facilitating secure ad hoc service discovery in public environments

Feng Zhu, Matt Mutka, Lionel Ni
2005 Journal of Systems and Software  
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging.  ...  We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications.  ...  In case a mobile device is lost, the user may disable the mobile device to access any services via the proxy.  ... 
doi:10.1016/j.jss.2004.07.014 fatcat:kvccpctj2zbtplkygvw67fgr2i

Nomadic mobility between smart homes

Raihan Ul Islam, Mischa Schmidt, Hans-Joerg Kolbe, Karl Andersson
2012 2012 IEEE Globecom Workshops  
Powerful, user-friendly mobile devices and costefficient wireless access technologies have lately changed the landscape for smart home environments to a large extent.  ...  This paper presents and evaluates an architecture for nomadic mobility in such environments where end-users, by authenticating their terminals with a node in the home or visited environment using the infrastructure  ...  ACKNOWLEDGMENT This work has partially been supported by the Nordic Interaction and Mobility Research Platform (NIMO) project [21] funded by the InterReg IVA North program.  ... 
doi:10.1109/glocomw.2012.6477725 dblp:conf/globecom/IslamSKA12 fatcat:wiblixt5sjakffozlw7fclkmga

Securing the wireless internet

V. Gupta, S. Gupta
2001 IEEE Communications Magazine  
This article presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices.  ...  This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings.  ...  ACKNOWLEDGMENTS We based portions of our native cryptographic code on Ian Goldberg's PalmOS port of SSLeay.  ... 
doi:10.1109/35.968814 fatcat:zm3ooi6hbbggxkhjdgmhbzruae

Incorporating proxy services into wide area cellular IP networks

Zhimei Jiang, Li Fung Chang, Byoung Jo J. Kim, Kin K. Leung
2001 Wireless Communications and Mobile Computing  
of the device in use.  ...  In this paper, we study the placement of proxy servers, especially the approach of incorporating proxies into cellular networks, which allows better, faster, and more secure proxy services.  ...  For devices that do not support TCP, TCP connections may be ended at the proxy server, while the proxy server conveys the data to mobile devices using protocols that are supported by the devices.  ... 
doi:10.1002/wcm.20 fatcat:a4xkwngztjahnhrcrwfhzq3eyy

Towards secure mobile P2P applications using JXME

Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez
2012 Journal of Internet Services and Information Security  
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices.  ...  This paper analyzes the current state of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.  ...  Thus, JXME was developed in order to allow mobile devices to create standalone mobile JXTA networks or to participate in a JXTA network using a mobile device.  ... 
doi:10.22667/jisis.2012.02.31.001 dblp:journals/jisis/Domingo-PrietoA12 fatcat:tkc3lqo4mfenlkzwgj7u4qx2te

End-to-end security implementation for mobile devices using TLS protocol

Baris Kayayurt, Tugkan Tuglular
2006 Journal in Computer Virology  
Data security problems can be minimized through the implementation of end-to-end security in this proxybased environment. Many mobile networks have proxy-based architecture.  ...  The communication of data in mobile devices is provided by the mobile networks. Mobile networks are open to many kinds of attacks.  ...  Design of mobile devices end-to-end security architecture The security protocol presented in this paper is an endto-end security protocol based on TLS 1.0 specifications and adopted to work on J2ME mobile  ... 
doi:10.1007/s11416-006-0017-x fatcat:3mopnvppdvboln3l4yzn24inyy
« Previous Showing results 1 — 15 out of 18,315 results