Filters








3,564 Hits in 4.8 sec

Revising centralized certificate validation standards for mobile and wireless communications

K. Papapanagiotou, G.F. Marias, P. Georgiadis
2010 Computer Standards & Interfaces  
In this paper, we review standards' specifications and suggestions for optimization and we propose ADOPT (Ad hoc Distributed OCSP for Trust), a certificate validation protocol which can be successfully  ...  applied in MANETs but also in mobile and wireless networks.  ...  In this paper, we review standards' specification concerning certificate validation, focusing on wireless and mobile communications.  ... 
doi:10.1016/j.csi.2009.07.001 fatcat:soeqtwghsnfqbjrgzlq2pc6obu

Digital and Dynamic Certification in the Framework of the novel revised RTTE Directive in Europe

Markus Dominik Mueck, Thomas Haustein, Paul Bender
2011 Proceedings of the 6th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications  
The next revision of the R&TTE Directive, which represents the basic regulatory framework for wireless communication in Europe, is expected to be finalized in 2011.  ...  For this purpose, this paper proposes novel approaches for updating certificates building on the novel concepts of dynamic Declaration of Conformity, CE Marking and Alert Symbol marking as they are discussed  ...  The operator's network triggers the verification of the MD identity and valid software certificates over the central certification database in the internet; 3.  ... 
doi:10.4108/icst.crowncom.2011.245858 dblp:conf/crowncom/MueckHB11 fatcat:vkc4jytnszeuthaidd3mfodasy

Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead

G. Baldini, T. Sturman, A. R. Biswas, R. Leschhorn, G. Godor, M. Street
2012 IEEE Communications Surveys and Tutorials  
This paper provides an overview of the SDR and CR certification process and how it is related to the security aspects.  ...  We identify the requirements for the deployment of SDR and CR, the main security threats and challenges and the related protection techniques.  ...  However, published standards are needed for certification.  ... 
doi:10.1109/surv.2011.032511.00097 fatcat:6r4qyhbhwjcszph5kxfjvxcf4y

Security authentication of 3G-WLAN interworking

Yao Zhao, Chuang Lin, Hao Yin
2006 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)  
high end-to-end security and authentication for the users.  ...  With the development of wireless Internet, the interworking of the Third Generation (3G) wide area wireless networks and Wireless Local Area Networks (WLAN) has become a focus of research. 3G systems have  ...  Introduction Recently, wireless communications have developed rapidly and have been applied for many services such as Internet services and mobile applications.  ... 
doi:10.1109/aina.2006.300 dblp:conf/aina/ZhaoLY06 fatcat:capc2vww7rcwpok5lurteh3jha

URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks

H. Luo, J. Kong, P. Zerfos, S. Lu, L. Zhang
2004 IEEE/ACM Transactions on Networking  
Nahrstedt and the reviewers.  ...  At high moving speeds, it is much more difficult for the centralized CA server to establish communication with the mobile clients.  ...  ., communications with one or a few centralized certification servers, will cause the available per-node bandwidth to diminish in the order of as the number of networking nodes increases [17] . 2) Mobility  ... 
doi:10.1109/tnet.2004.838598 fatcat:acxfvrc75vh27kjzaglwm2ix4a

Secure mobile business applications – framework, architecture and implementation

Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson
2004 Information Security Technical Report  
Emerging mobile technologies such as PDAs, laptops and smart phones together with wireless networking technologies such as WLAN and UMTS promise to empower mobile employees to become better integrated  ...  We present a framework offering solutions for the development of secure mobile business applications that takes into account the need for strong security credentials, e.g. based on smart cards.  ...  Acknowledgements We would like to thank our partners in the WiTness project for fruitful discussions and contributions to the presented framework.  ... 
doi:10.1016/s1363-4127(05)70036-4 fatcat:r5chfin2jbchhexv7ft7jshz5q

A Survey of Security and Privacy in Connected Vehicles [chapter]

Lotfi Ben Othmane, Harold Weffers, Mohd Murtadha Mohamad, Marko Wolf
2015 Wireless Sensor and Mobile Ad-Hoc Networks  
The cellular network enables communications of devices that have wireless communication capabilities (e.g., mobile phones) with mobile and land phones (cf. [3]).  ...  The aspects are: security of communication links, data validity, security of devices, identity and liability, access control, and privacy of drivers and vehicles.  ...  Arno Spinner, from The Federal Highway Research Institute (BASt), Germany, and Pelin Anguin, from Purdue University, for providing valuable comments on an earlier draft of this book chapter.  ... 
doi:10.1007/978-1-4939-2468-4_10 fatcat:xchhqdpwrba45gduolr5fwcbcm

The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

Paul Pop, Detlef Scholle, Hans Hansson, Gunnar Widforss, Malin Rosqvist
2016 2016 Euromicro Conference on Digital System Design (DSD)  
SafeCOP will also contribute to new standards and regulations, by providing certification authorities and standardization committees with the scientifically validated solutions needed to craft effective  ...  SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless communication, multiple stakeholders, dynamic system definitions (openness), and unpredictable  ...  The advantages include lower certification costs, increased trustworthiness of wireless communication, better management of increasing complexity, reduced effort for verification and validation, lower  ... 
doi:10.1109/dsd.2016.25 dblp:conf/dsd/PopSHWR16 fatcat:hloroehb45culoxhygh3p3qw5y

EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability [chapter]

E. Sithirasenan, K. Ramezani, S. Kumar, V. Muthukkumarasamy
2013 Selected Topics in WiMAX  
Security in wireless sensor networks, Wireless Personal Communications, . , -[ ] IEEE Standard i Part , Wireless Medium "ccess Control M"C and Physical Layer PHY specifications.  ...  E"P method for re-authentication with integrated support for fast handover and IP mobility in wireless L"Ns, in Proceedings of the nd international conference on communications and electronics, ICCE .  ... 
doi:10.5772/54837 fatcat:heinn36gavfurhuf7rngblqkku

Proactive attack: A strategy for legitimate eavesdropping

Hung Tran, Hans-Jurgen Zepernick
2016 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)  
SafeCOP will also contribute to new standards and regulations, by providing certification authorities and standardization committees with the scientifically validated solutions needed to craft effective  ...  SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless communication, multiple stakeholders, dynamic system definitions (openness), and unpredictable  ...  The advantages include lower certification costs, increased trustworthiness of wireless communication, better management of increasing complexity, reduced effort for verification and validation, lower  ... 
doi:10.1109/cce.2016.7562679 fatcat:zz2xuc2urfcuzowfz224v4shpu

A methodology for analyzing the performance of authentication protocols

Alan Harbitter, Daniel A. Menascé
2002 ACM Transactions on Privacy and Security  
In the second example, we propose a Kerberos variant for a mobile computing environment and analyze the performance benefits realized by introducing a proxy to offload processing and communications workload  ...  In this article, we develop a validated modeling methodology to be used for analyzing authentication protocol features, and we use two examples to illustrate the methodology.  ...  ACKNOWLEDGMENTS The authors would like to extend special thanks to the reviewers for comments that greatly improved the quality of the final article.  ... 
doi:10.1145/581271.581275 fatcat:mrisahblurbfpattavkuo4wfne

DSA-Mesh: a distributed security architecture for wireless mesh networks

Fabio Martignon, Stefano Paris, Antonio Capone
2011 Security and Communication Networks  
for wireless mesh networking.  ...  security and data confidentiality of all communications that occur in the backbone of the WMN.  ...  wireless LAN, where mobile devices connect to an access point.  ... 
doi:10.1002/sec.181 fatcat:mrhuji3ejnbuxobq6quzncclum

Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

mr. Monika, Mukesh Kumar, Rahul Rishi
2010 International Journal of Computer Applications  
Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers.  ...  of centralized administration.  ...  And my Research Guide without their help that work is not completed.  ... 
doi:10.5120/1649-2218 fatcat:l5c3zziv6jaq7fgn55ttwbvoje

Wireless Communications: Myths and Reality

Samuel C. Yang, Charlie C. Chan
2004 Communications of the Association for Information Systems  
For business, the anticipated revenue opportunities of Wi-Fi and mobile e-commerce are addressed. For society, issues of wireless security and its effect on wireless adoption are examined.  ...  For technology, wireless' limited bandwidth and its effect on new wireless applications and services are discussed.  ...  It was with the authors for seven weeks for one revision. It was published on June 29, 2004.  ... 
doi:10.17705/1cais.01339 fatcat:jeaatt6zbvgshnjuqehoiv5zee

An onion ring framework for developing and assessing mobile commerce security

June Wei, Lai C. Liu, Kai S. Koong
2006 International Journal of Mobile Communications  
A five-layer 'onion ring' framework for analysing mobile commerce security requirements and for improving system security performance is presented in this research.  ...  quantifiable approaches, based on weighted scores applied to either a spider diagram or a decision solution matrix, are used to demonstrate how the security level can actually be objectively measured and  ...  The revisions and expansions contained in this new paper are supported by a Creative and Scholarly Research Activity Grant at the University of West Florida that was allocated in 2004.  ... 
doi:10.1504/ijmc.2006.008605 fatcat:ugtezejaxbfs3crbm4nk67ear4
« Previous Showing results 1 — 15 out of 3,564 results