Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
نویسندگان
چکیده
For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as an appropriate trusted gateway for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. We propose a security model for access control to the communication infrastructure that is also messagebased. To meet the requirements of ubiquitous communicating machines, all algorithms on the sender’s side are based on symmetric cryptography resulting in low computation needs. A sophisticated symmetric key infrastructure for message authentication provides the necessary key management. The trustworthiness of the mobile phone is achieved by using the SIM as a secure storage and computing module. This makes it possible to use the mobile phone not only as a user terminal but also as a trusted infrastructure component of the mobile network.
منابع مشابه
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to the Internet for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. In this paper we propose a security model for access control to the co...
متن کاملEffect of Distance Education via Short Message Service of Mobile Phones on Self-efficacy and HbA1C of Patients with type 2 Diabetes Mellitus
Background and Objectives: Mobile-based education as the most basic form of e-health initiatives can be an important aspect to be considered and valued for providing health services. This study assessed the effect of education via short message service on hemoglobin A1C and self-efficacy among patients with type 2 diabetes. Materials and Methods: This was a randomized clinical trial in which 81...
متن کاملA Service Architecture for Monitoring Physical Objects Using Mobile Phones
Ubiquitous computing technology holds the promise of enabling comprehensive localization services for any physical object that is augmented with an electronic tag. Given an adequate object sensing infrastructure (e.g., based on RFID readers or sensor networks), the location of an arbitrary object could be obtained at the touch of a button. However, the large effort involved in installing a ubiq...
متن کاملDesign and Implementation of Steganography Along with Secured Message Services in Mobile Phones
Design and Implementation of Steganography along with secured message services in Mobile Phones is used to provide security to the data that flows across the mobiles. Two people may communicate securely by encrypting the message sent between them. Now a day, several methods are used for communicating secret messages for defense purpose or in order to ensure the privacy of communication between ...
متن کاملSpread Spectrum Image Steganography in Multimedia Messaging Service of Mobile Phones
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunication companies added feature such as MMS (Multimedia Messaging Service) in order to attract more customers. The Multimedia Messaging Service (MMS) has became very popular for sending messages containing multimedia objects such as images, audio, or video clips among mobile users...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007