Search results for "Security"
showing 10 items of 1693 documents
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
2012
The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in foreseeable future reaching 8ZB already by 2015. Traditionally, in order to cope with the growing demand for storage capacity, organizations proactively built and managed their private storage facilities. Recently, with the proliferation of public cloud infrastructure offerings, many organizations, instead, welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services. The comparative cost-efficiency of these two alternatives depends on a number of factors, among which are e.g. the prices of the public…
LifeRescue: A web based application for emergency responders during fire emergency response
2016
In order to respond to any kind of building fire emergencies, first-responders have to use lot of time to get access to the emergency data such as location of the victims who are still inside the building, location of the hazardous material, location of the resources and location of the exits in order to perform search and rescue. However, search is possibly one of the most dangerous activities on the fire ground. Sometimes the visibility is zero and the environment is really hot. Because of the limited operating time in the building, the key to successful search is how quickly emergency responders can get access to the emergency related information in order to save victims and the property…
Virtualization of Remote Devices and Services in Residential Networks
2009
Lately solutions for remote access for residential services have been proposed. However, these solutions require modifications to the service controllers. In addition, remote access adds complexity to the client application. We propose here a solution for decoupling remote access from the client itself with an entity that creates virtual instances of remote services in a local network. Thereby, clients will be able to discover the virtual instance and use it. Moreover, client applications do not need to distinguish between local and remote services hence reducing complexity.
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs
2012
Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…
Autonomy, Heterogeneity and Trust in Mobile P2P environments
2007
Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…
Introduction to the Minitrack on Software Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systems
2021
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
2010
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…
Mobile Electronic Commerce: Emerging Issues
2000
There are many definitions for Mobile Electronic Commerce (M-Commerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a mobile terminal and thus using the mobile telecommunications network. The Wireless Application Protocol (WAP) plays an important role in m-commerce by optimizing Internet standards for the constraints of the wireless environment and thus bridging the gap between Internet and mobile world. Mobile Network Operators can play a major role in m-commerce by being strategically positioned between customers and content/service providers. In this paper we investigate the roles the operator can play in m-commerce and discuss respecti…