IARIA

Displaying 761-800 of 1224 results

  • White Papers // Aug 2011

    Performance Analysis of Pilot Aided OFDMA Systems for Mesh Networks

    This paper presents a systematic approach for analyzing the bit error probability of pilot aided Orthogonal Frequency-Division Multiple Access (OFDMA) systems. A comparative analysis with the conventional pilot pattern schemes, overlapped pilot scheme and interlaced pilot scheme, is developed. The results obtained here can be directly applied to evaluate the...

    Provided By IARIA

  • White Papers // Aug 2011

    A MAC Throughput Over Rayleigh Fading Channel in the 802.11a/g/n-Based Mobile LAN

    This paper explores a MAC (Medium Access Control) layer throughput with DCF (Distributed Coordination Function) protocol in the IEEE 802.11a/g/n-based mobile LAN. It is evaluated in Rayleigh fading wireless channel, using theoretical analysis method. The DCF throughput performance is analyzed by using the number of stations with both variable payload...

    Provided By IARIA

  • White Papers // Aug 2011

    Performance Evaluation of Handover Policies in Mobile Heterogenous Networks

    The increasingly ubiquitous deployment of wireless networks together with efforts to complete the standardization of Media Independent Handover (MIH) will support the 4G (Fourth Generation) vision in offering seamless access and an integrated network-of-networks (i.e., all IP network). In the same time, the handover process complexity will increase in next...

    Provided By IARIA

  • White Papers // Aug 2011

    Design and Implementation of a Cooperative Protocol for Extending Coverage in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) have attracted great attention in the last few years because of their advantages over traditional wireless networks. WMNs can be seen as a mixture of ad hoc and infrastructure networks, with all the underlying benefits of such hybrid architecture. Mesh architecture sustains signal strength by breaking...

    Provided By IARIA

  • White Papers // Aug 2011

    TenDoc: Network Coding-Based Software for Wireless Ad Hoc Networks

    This paper builds upon previous studies that highlight the benefits of Network Coding for all too all traffic patterns. This is the case within the framework of an Optimized Link State Routing protocol (OLSR) where topology control messages are flooded in the entire network in order to provide a precise...

    Provided By IARIA

  • White Papers // Aug 2011

    Connecting the Unconnected

    Many new cell phones on the market come with 802.11 enabled, along with standard Bluetooth functionality. A large percentage of working class people in South Africa typically cannot afford 802.11 enabled cell phones, and thus the most applicable form of wireless data transfer is achieved through the Bluetooth protocol. This...

    Provided By IARIA

  • White Papers // Jul 2011

    Practical Performance Measurements and Analysis of IEEE 802.16 Networks

    IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHYsical (PHY) and media access control (MAC) layers. The WiMAX technology based on air interface standard 802.16 wireless Metropolitan Area Network (MAN) is configured in the same way...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation for DSRC Vehicular Safety Communication: A Semi-Markov Process Approach

    In this paper, an analytic model is proposed for the performance evaluation of vehicular safety related services in the Dedicated Short Range Communications (DSRC) system on highways. The generation and service of safety messages in each vehicle is modeled by an M/G/1 queue. A Semi-Markov Process (SMP) model is developed...

    Provided By IARIA

  • White Papers // Jul 2011

    A Resource Management Strategy to Support VoIP Across Ad Hoc IEEE 802.11 Networks

    This paper describes the concept of the resource management strategy in ad hoc networks for rescue operations. The presented strategy is a result of the new outlook on the IEEE 802.11 networks capabilities and performance enhancement. The proposed solution is dedicated to real time services support and is based on...

    Provided By IARIA

  • White Papers // Jul 2011

    QoS Signaling for Service Delivery in NGN/NGS Context

    The evolution of next generation network raises the issue of exploiting customizable services for a nomadic user within the environment of heterogeneity and mobility. In this paper, the E2E QoS (Quality of Service) always remains as a challenge. In fact, the E2E supposes that apart the network resource, the service...

    Provided By IARIA

  • White Papers // Jul 2011

    Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes Under Time-Varying Jamming Links

    In order to provide reliable and secure communication against eavesdroppers and jammers over networks, Universal Secure Error-Correcting Network Codes (USECNC) based on Maximum-Rank-Distance (MRD) codes have been introduced. This code can be applied to any underlying network codes. However, Shioji et al. introduced a reasonable network model against the code....

    Provided By IARIA

  • White Papers // Jul 2011

    A Robust Periodogram-Based IFO Estimation Scheme for OFDM-Based Wireless Systems

    In this paper, the authors propose a new periodogram-based Integer Frequency Offset (IFO) estimation scheme robust to the Fractional Frequency Offset (FFO) variation. The authors first observe the reason why the conventional IFO estimation scheme in this paper, which is sensitive to the variation of the FFO, and then, propose...

    Provided By IARIA

  • White Papers // Jul 2011

    Testing Triple Play Services Over Open Source IMS Solution for Various Radio Access Networks

    Nowadays, with the development of next generation networks, new standards for voice and video services have been introduced, and VoIP (Voice over IP) has become a very popular protocol. It leads to the convergence of networks which provide voice and data transfer services with enhanced and improved applications for customers....

    Provided By IARIA

  • White Papers // Jul 2011

    Novel Load Balancing Scheduling Algorithms for Wireless Sensor Networks

    In this paper, optimal scheduling mechanisms are developed for packet forwarding in wireless sensor networks, where clusterheads are gathering information. The objective is to monitor real-life processes for a given time interval and forward packets with minimum loss probabilities to the base station. In order to achieve this objective the...

    Provided By IARIA

  • White Papers // Jul 2011

    The Impact of Control Information Prioritization on QoS Performance Metrics

    Real-time protocols such as Real-time Transport Protocol (RTP) and its companion protocol Real-time Transport Control Protocol (RTCP) are the solution for customers who have progressively come to desire real-time services. The characteristics of RTP and RTCP packets differ since they carry different content types, i.e., real-time data and control data,...

    Provided By IARIA

  • White Papers // Jul 2011

    Quality of Services Assurance for Multimedia Flows Based on Content-Aware Networking

    This paper proposes a new architectural solution to support Quality of Services (QoS) for real time media flows in a multi-domain system based on new concepts as Content-Aware Networks (CAN) and Network Aware Application (NAA). The system described, based on coupling between network and applications is focused, but not limited...

    Provided By IARIA

  • White Papers // Jul 2011

    Customer Security Concerns in Cloud Computing

    There is no consensus about what exactly cloud computing is, but some characteristics are clearly repeated. It is a new distributed computing and business paradigm. It provides computing power, software and storage and even a distributed data center infrastructure on demand. In this paper, the authors investigated what are the...

    Provided By IARIA

  • White Papers // Jul 2011

    A Formal Methodology for Procedural Security Assessment

    Formal analysis techniques can deliver important support during ICT-based innovation (or redesign) efforts in e-government services. This paper discusses a formal methodology for assessing the procedural security of an organization. The authors do so by explicitly reasoning on critical information flow named assets flows. With this it is possible to...

    Provided By IARIA

  • White Papers // Jul 2011

    Intrusion Detection System for Wide Automation Network Based on the Ethernet Compatible Communication Protocols

    In this paper, the authors focus on the description of importance, design, and implementation of the Intrusion Detection Systems (IDS) for a new automation system based on the Ethernet communication protocol. Newly developed and designed automation networks for complex factory control are composed from several types of automation communication links...

    Provided By IARIA

  • White Papers // Jul 2011

    BPMN Requirements Specification as Narrative

    The first two phases of the software development process include a requirements analysis stage that demands conceptualization of a \"Real world domain\" and the design stage of the software product. UML-based diagrams are typically used to model systems and make them readable. In this paper, the authors view conceptualization of...

    Provided By IARIA

  • White Papers // Jul 2011

    Nontechnical SPAM Detection Paradigm in Unified Communications Systems

    The recognition and filtering out of unwanted messages in technical communications media presents an ever more difficult challenge. The best-known of these problems is with ubiquitous e-mail. Most email sent is unwanted spams. In order to protect the recipient the most diverse applications must be used. Longer observations have shown...

    Provided By IARIA

  • White Papers // Jul 2011

    The Impact of Corporate Culture in Security Policies - A Methodologya

    Despite security policies, standards, awareness strategies and tools currently in place, employees are still being involved in risky a behavior that jeopardizes businesses. Meanwhile, although security policies are the cornerstone of well-designed security strategies, recent studies have demonstrated poor adherence or even negligence in accordance with the rules security policies...

    Provided By IARIA

  • White Papers // Jul 2011

    A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines

    Recently, there has been shift to multi-core processors and consequently multithreaded application design. Multithreaded Network Intrusion Detection and Prevention Systems (NIDPS) are now being considered. Suricata is a multithreaded open source NIDPS, being developed via the Open Information Security Forum (OISF). It is increasing in popularity, as it free to...

    Provided By IARIA

  • White Papers // Jul 2011

    Generic Security Services API Authentication Support for the Session Initiation Protocol

    The mandatory and most deployed authentication method used in the session initiaton protocol, the Digest Access Authentication method, is weak. Other, more secure authentication methods have emerged, but have seen little adoption yet. In this paper, support for using a generic authentication method, the generic security services API, is added...

    Provided By IARIA

  • White Papers // Jul 2011

    A Graphical Interface for User Authentication on Mobile Phones

    Recently, mobile phones have become an important tool to carry out financial transactions besides the normal communication. They are increasingly being used to make payments, access bank accounts and facilitate other commercial transactions. In view of their increased importance there is a compelling need to establish ways to authenticate people...

    Provided By IARIA

  • White Papers // Jul 2011

    Fast and Automatic Verification of Authentication and Key Exchange Protocols

    Security in a Peer-To-Peer (P2P) system is not considered, although it has many potential threats. In order to make the whole P2P system secure, various security functions require to be taken into consideration for these threats, respectively. The authors take up authentication and key exchange protocols as a target of...

    Provided By IARIA

  • White Papers // Jul 2011

    A View-Based Approach for Service-Oriented Security Architecture Specification

    Developing secure software is still a software engineering challenge because of the complexity of software security. Yet integrating security engineering and software engineering is increasingly important, especially for service-oriented applications, as they are exposed to new security challenges due to their open nature. Current security engineering approaches do not consider...

    Provided By IARIA

  • White Papers // Jul 2011

    Online Banking Fraud Detection Based on Local and Global Behavior

    In this paper, the authors present a fraud detection system proposed for online banking that is based on local and global observations of users' behavior. Differential analysis is used to obtain local evidence of fraud where a significant deviation from normal behavior indicates a potential fraud. This evidence is strengthened...

    Provided By IARIA

  • White Papers // Jul 2011

    Storage QoS Aspects in Distributed Virtualized Environments

    Storage performance of a single virtual machine in a cloud computing environment may be affected by other machines using the same physical storage. At the same time, user requirements concerning quality of service continue to increase, which brings new challenges for virtualized environments. In this paper the authors present the...

    Provided By IARIA

  • White Papers // Jul 2011

    Real-Time Processor Interconnection Network for FPGA-Based Multiprocessor System-on-Chip (MPSoC)

    In this paper the authors introduce a new approach for a Network On Chip (NOC) design which is based on an NlogN interconnect topology. The intended application area for the NOC is the real-time communication of multiprocessors that are hosted by a single Field Programmable Gate Array (FPGA). The proposed...

    Provided By IARIA

  • White Papers // Jul 2011

    A Grid-based Approach to Continuous Clustering of Moving Objects

    With the rapid advances in wireless devices and positioning technologies, tracking and clustering of moving objects has drawn increasing attention. Previous methods of clustering moving objects merge clusters by searching all the existing clusters, which have an obvious decline in efficiency as the number of clusters increases. This paper proposes...

    Provided By IARIA

  • White Papers // Jul 2011

    Unified Language for Network Security Policy Implementation

    The main peculiarities of created Unified Language for Network Security Policy (ULNSP) are context-free grammar and its extensibility. The function-based approach in rules formalization used allows adding new types of rules easily. Inherently, any policy rule formalized in ULNSP describes security function policy. The language also provides convenient syntax and...

    Provided By IARIA

  • White Papers // Jul 2011

    Network Security Threats and Cloud Infrastructure Services Monitoring

    Today Cloud Computing and virtual infrastructure are one of the most popular ways to deploy application hosting and web-farm platforms. Cloud Infrastructure services also known as \"Infrastructure as a Service\" (IaaS) is the way to deliver computer infrastructure, typically virtual environment as a service. Distributed nature of IaaS and likelihood...

    Provided By IARIA

  • White Papers // Jul 2011

    Provisioning Service Differentiation for Virtualized Network Devices

    In order to efficiently utilize the network bandwidth and flexibly enable one or more networks to be combined or subdivided into virtual networks, it is essential to virtualize network devices and then to provide service differentiation for the virtualized network devices. In this paper, the authors propose a virtualizing method...

    Provided By IARIA

  • White Papers // Jul 2011

    Stateful or Stateless Flooding Attack Detection?

    SYN flooding attacks exploit the 3-way handshake characteristic of TCP connection setup to cause denials of service. Many techniques have been proposed for the detection of flooding attacks; most are stateless while a few are stateful. A stateful method keeps specific information on flows of packets while stateless methods will...

    Provided By IARIA

  • White Papers // Jul 2011

    Using Reinforcement Learning for Autonomic Resource Allocation in Clouds: Towards a Fully Automated Workflow

    Dynamic and appropriate resource dimensioning is a crucial issue in cloud computing. As applications go more and more 24/7, online policies must be sought to balance performance with the cost of allocated virtual machines. Most industrial approaches to date use ad hoc manual policies, such as threshold-based ones. Providing good...

    Provided By IARIA

  • White Papers // Jul 2011

    Business Protocol Monitoring

    Because it is never sure that a business process successfully tested or statistically checked will have the expected behaviour during its execution, it is necessary to bring verification to the execution phase, by continuously observing and checking the correct behaviour of business processes during run-time. In this paper, the authors...

    Provided By IARIA

  • White Papers // Jul 2011

    Collaborative Digital Library Services in a Cloud

    The authors have developed a web-based system that allows users to collaboratively organize large online image collections according to an evolving faceted classification schema. One of the major issues identified in the early deployment and evaluation in a university setting is the scalability of the system on traditional server implementations....

    Provided By IARIA

  • White Papers // Jul 2011

    Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments

    Industrial control networks, e.g., for factory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While standard communication technologies...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    A Heap-Based P2P Topology and Dynamic Resource Location Policy for Process Migration in Mobile Clusters

    A mobile cluster experiences disruption in execution of long-running applications due to its highly dynamic nature. Process migration handles such dynamism to have seamless computing with minimal disruption. The challenge in process migration is that it should take considerably less time and techniques adopted for static networks are not suitable...

    Provided By IARIA

  • White Papers // Jul 2011

    MMSP: Designing a Novel Micro Mobility Sensor Protocol for Ubiquitous Communication

    Designing low power and less delay for mobile nodes is one of the most important issues for the Ubiquitous Sensor Networks (USN). The paper presents a novel Micro Mobility Sensor Protocol (MMSP), as an enhanced form of the AODV (Ad hoc On-demand Distance Vector) protocol, in order to improve the...

    Provided By IARIA

  • White Papers // Jul 2011

    Handover Scenario and Procedure in LTE-Based Femtocell Networks

    The deployment of Femtocell as the emerging wireless and mobile access technology becomes a solution for the bandwidth limitation and coverage issues in conventional mobile network system (macrocell). In this paper the handover procedure in femtocell network is investigated. The procedure is based on 3GPP LTE specification. Three handover scenarios:...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Analysis of Receive Collaboration in TDMA-Based Wireless Sensor Networks

    This paper presents a general framework to enable the implementation of receive collaboration in Wireless Sensor Networks (WSN). The framework also allows the evaluation of Collaborative Channel Equalization (CCE) performance as one aspect of receive collaboration. The authors' analysis shows that the use of receive collaboration to receive signals from...

    Provided By IARIA

  • White Papers // Jul 2011

    Anonymous Agents Coordination in Smart Spaces

    Rapid developments of communication, data processing and storage technologies, and continuing proliferation of consumer devices that surround user have created an opportunity for creation of a new generation of services based on smart spaces concept. The current approach for expanding mobile devices functionality is integration of new physical components. But...

    Provided By IARIA

  • White Papers // Jul 2011

    Case Study of the OMiSCID Middleware: Wizard of Oz Experiment in Smart Environments

    This paper presents a case study of the usage of OMiSCID 2.0, the new version of a lightweight middleware for ubiquitous computing and ambient intelligence. The objective of this middleware is to bring Service Oriented Architectures to all developers. After comparing to available solutions, the authors show how it integrates...

    Provided By IARIA

  • White Papers // Jul 2011

    SmartBuilding: A People-to-People-to-Geographical-Places Mobile System Based on Augmented Reality

    People-to-People-to-Geographical-Places systems connect places to communities. Generally, these systems require users to perform complex tasks using mobile phones. Thus, the creation of powerful interaction techniques and the design of effective and easy interfaces are key requirements. The system, the authors propose in this paper, named SmartBuilding, is a mobile Augmented...

    Provided By IARIA

  • White Papers // Jul 2011

    Network Architectures for Ubiquitous Home Services

    The on-going growth of connectivity has brought new opportunities for Home Network; Home network will soon be a place of a large amount of services, from the gadget to the home control. In order to provide and render these services, operator should propose a framework for supporting the deployment of...

    Provided By IARIA

  • White Papers // Jul 2011

    The QoE-Oriented Heterogeneous Network Selection Based on Fuzzy AHP Methodology

    The next generation of wireless communication will be characterized by heterogeneity. One of the challenges arisen is access selection among various radio access technologies. Meanwhile, the Quality of Experience (QoE) of user is becoming one of the most concerned topics. Analytic Hierarchy Process (AHP) has been popularly used in network...

    Provided By IARIA

  • White Papers // Jul 2011

    EAP-Kerberos: Leveraging the Kerberos Credential Caching Mechanism for Faster Re-Authentications in Wireless Access Networks

    Although the wireless technology nowadays provides satisfying bandwidth and higher speeds, it still lacks improvements with regard to handoff performance. Existing solutions for reducing handoff delays are specific to a particular network technology or require expensive upgrades of the whole infrastructure. In this paper, the authors investigate performance benefits of...

    Provided By IARIA

  • White Papers // Jul 2011

    BeAware: A Framework for Residential Services on Energy Awareness

    Lately a wide variety of products and services are emerging to address energy efficiency in households by providing timely information. This area is still relatively young in terms of adoption of advanced ICT still exploring what functionality and features should be part of such services. Here, the authors propose a...

    Provided By IARIA

  • White Papers // Jul 2011

    Acceptance Models for the Analysis of RFID

    Although there is a high dispersion of RFID in many areas of the economy, it can be said that up until now this technology has been barely implemented and accepted within law firms. Considering the severe problems when tracking documents and although these systems facilitate specific improvement in various sub...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Comparison of Video Traffic Over WLAN IEEE 802.11e and IEEE 802.11n

    This paper reviews the fast deployment of Wireless Local Area Networks (WLANs) and the ability of WLAN to support real time services. Stringent Quality of Service (QoS) and high throughput requirements has come into force. The authors compare the QoS support in the IEEE 802.11e to 802.11n standard. The 802.11n...

    Provided By IARIA

  • White Papers // Jul 2011

    Improvement of Channel Decoding Using Block Cypher

    This paper introduces two methods for the improvement of performance of channel coding using cryptography, based on concatenation of codes. Cryptography as an outer code is combined with channel coding as an inner code. The first method improves decoding of cryptographic functions. The second one uses the first method for...

    Provided By IARIA

  • White Papers // Jul 2011

    Distortion Free Steganographic System Based on Genetic Algorithm

    Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not possess the right keys. This paper shows that most of the steganographic systems proposed during the past...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks

    Recent technological advancements and low price of deployment and maintenance of Wireless Sensor Networks (WSNs) allow their use in numerous applications in industry, research, and commerce, in order to gather environmental data in an unattended manner. Since, WSNs usually function in open environments, they may become a target of attacks...

    Provided By IARIA

  • White Papers // Jul 2011

    GeCSen - A Generic and Cross-Platform Sensor Framework for LocON

    In this paper, the authors present a generic and crossplatform sensor framework for the LocON location and sensor middleware. This framework is developed using C++/Qt. Sensor information is rapidly gaining importance in automating processes and ubiquitous computing, and so it is for projects like FP7 LocON where the main goal...

    Provided By IARIA

  • White Papers // Jul 2011

    Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards

    The Security-by-Contract (SC) framework has recently been proposed to support applications' evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    MagiSign: User Identification/Authentication Based on 3D Around Device Magnetic Signatures

    In this paper, the authors present "MagiSign", a new user identification/authentication technique based on 3D magnetic signatures created in the space around a (mobile) device. The main idea is to influence magnetic (compass) sensor embedded in some mobile devices (e.g., iPhone 3GS, G1/2 Android) using a properly shaped magnet. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Classification of Mobile P2P Malware Based on Propagation Behaviour

    With a multifold increase in the number of mobile users over past few years, mobile malware has emerged as a serious threat for resource constrained handheld devices. From experience of the Internet malware attacks like CodeRed and Slammer, it may not be difficult to predict the extent of devastation mobile...

    Provided By IARIA

  • White Papers // Jul 2011

    Link Stability in MANETs Routing Protocols

    Mobile Ad hoc NETworks (MANETs) is a promising communication paradigm for the emerging collaborative environments, which do not need an underlying stable, centralized routing and management infrastructure. In this paper, the authors propose a particular approach for the design of a mobile routing protocol focused on the stability (measured as...

    Provided By IARIA

  • White Papers // Jul 2011

    A Device-Aware Spatial 3D Visualization Platform for Mobile Urban Exploration

    Mobile devices displaying 2D map representations are already commonly used for the exploration of urban surroundings on the move. Even though mobile detailed 3D visualizations promise to be an attractive way to cope with the increasing amount of georeferenced information, their widespread use is hampered by the fragmentation of today's...

    Provided By IARIA

  • White Papers // Jul 2011

    QoS Aware Mixed Traffic Packet Scheduling in OFDMA-Based LTE-Advanced Networks

    In this paper, a packet scheduling framework is proposed for LTE-Advanced downlink transmission. The proposed framework adds the new functionality of an adaptive TD scheduler with built-in congestion control to the existing conventional Quality of Service (QoS) aware packet scheduling algorithms. It optimizes multiuser diversity in both the time and...

    Provided By IARIA

  • White Papers // Aug 2011

    Proposal of N-Gram Based Algorithm for Malware Classification

    Obfuscation techniques degrade the n-gram features of binary form of the malware. In this paper, methodology to classify malware instances by using n-gram features of its disassembled code is presented. The presented statistical method uses the n-gram features of the malware to classify its instance with respect to their families....

    Provided By IARIA

  • White Papers // Aug 2011

    Extended Fault Based Attack Against Discrete Logarithm Based Public Key Cryptosystems

    Since, Bellcore's researchers proposed fault based attacks, these attacks have become serious threats to the implementation of cryptosystems. Boneh et al. first proposed a fault based attack against the exponentiation algorithm for RSA, and some variants of attack were proposed later. However, the previous variants of similar attack are applicable...

    Provided By IARIA

  • White Papers // Aug 2011

    Implementations of Block Cipher SEED on Smartphone Operating Systems

    As more and more people are using smartphones these days, a great deal of important information, such as personal information and the important documents of corporations among other things, are being saved on smartphones. Unlike a PC, people can access another person's smartphone without great difficulty, and there is a...

    Provided By IARIA

  • White Papers // Aug 2011

    An Approach for Enhancing the Security of Remotely Accessible, Sensitive Services With On-Site Monitoring

    Commonly, the deployment environment of software based services cannot be predicted in advance, which leads to need to have specific solutions to monitor their security and reliability during run-time. These services are also commonly accessed remotely, leading to further complexity in their monitoring and analysis. In this paper proposes a...

    Provided By IARIA

  • White Papers // Aug 2011

    Toward Engineering of Security of Information Systems: The Security Acts

    Business professionals and researchers have made considerable efforts and significant technical breakthroughs in information security in the last decades. Nevertheless, companies and organizations continue to incur losses associated with security issues. In order to remedy to this situation, the authors propose a new approach to information security engineering for companies...

    Provided By IARIA

  • White Papers // Aug 2011

    Establishing Authentication Trust in Open Environment Using Social Approach

    A trust metric is described for a user to ensure the authenticity of another user who is not known to system entities in an open environment. On the basis of the metric, an identity federation framework is proposed for propagating an authentication assertion for an unknown user across system entities....

    Provided By IARIA

  • White Papers // Aug 2011

    Migration Towards a More Secure Authentication in the Session Initiation Protocol

    This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, the authors add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual...

    Provided By IARIA

  • White Papers // Aug 2011

    PASER: Position Aware Secure and Efficient Route Discovery Protocol for Wireless Mesh Networks

    In this paper, the authors address an acceptable tradeoff between security and performance of the route discovery process in wireless mesh networks. They propose a Position Aware Secure and Efficient reactive hierarchical Route discovery protocol (PASER). The proposed protocol is tailored for rescue and emergency operations and aims to combat...

    Provided By IARIA

  • White Papers // Aug 2011

    Reliablity and Survivability of Wireless Sensor Network Using Security Adaptation Reference Monitor (SARM)

    Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN under attacks such as sinkhole. Therefore, new security mechanisms must be in accordance with energy...

    Provided By IARIA

  • White Papers // Aug 2011

    Federated Identity Management for Android

    A federated Identity Management system (IdM) must include mobile units and must provide mutual authentication for client-server connections. Existing frameworks for identity management like SAML are unlikely to apply well to resource constrained mobile terminals like Android. The contribution of this paper is an IdM with simpler data representation and...

    Provided By IARIA

  • White Papers // Nov 2011

    External Interference-Aware Distributed Channel Assignment in Wireless Mesh Networks

    Interference is one of the major causes for performance degradation in wireless networks. Channel assignment algorithms have been proven successful to decrease the network-wide interference by using non-overlapping channels for otherwise interfering links. However, external co-located networks and devices are usually not considered in the channel assignment procedure, since they...

    Provided By IARIA

  • White Papers // Nov 2011

    Communication System With SISO Channel Decoding Using Bit Stuffing

    This paper introduces a communication system with typically wireless transmission, with SISO convolutional decoding using predefined reliability values at input of the SISO decoder. "Dummy" bits are stuffed into the information which is to be transmitted over a noisy channel and SISO decoded. Stuffed bits have to be known at...

    Provided By IARIA

  • White Papers // Nov 2011

    An Approach to Enhance the Timeliness of Wireless Communications

    Wireless technologies are the present and the future of network communications. However, the support of real-time data transmission in wireless communications - providing support for execution of well-timed networked operations - is still an open issue, not fully addressed by current wireless network standards and technologies. Thus, this paper proposes...

    Provided By IARIA

  • White Papers // Nov 2011

    Opportunistic Spectrum Sharing Scheme for Secondary WiFi-Like Devices in TV White Spaces

    Secondary spectrum access is a promising approach to improve spectrum utilization by enabling new wireless systems to opportunistically use and efficiently share the licensed bands. This paper targets a WiFi-like reuse of available spectrum in the TV bands and proposes a novel cooperative centralized spectrum sharing scheme that enables protection...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA