scholarly journals Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Supriyanto Praptodiyono ◽  
Teguh Firmansyah ◽  
Mudrik Alaydrus ◽  
M. Iman Santoso ◽  
Azlan Osman ◽  
...  

Internet users have grown substantially over the last decade, especially following the emergence of mobile technology. Most Internet connections nowadays are accessed using mobile devices in order to stay connected all the time and everywhere. Owing to the limited coverage of such access points as well as base stations, mobile devices are required to handover connectivity if there is a move to other locations. Horizontal handover is conducted when the movement is within the same network. Otherwise, there must be vertical handover when external network infrastructure is encountered. However, as the Internet is an open network that naturally lacks trust between users, the mobile nodes that move to an external network are susceptible to various attacking activities. Compromising mobile nodes may cause users to lose their data as well as destroy their mobile devices in terms of both software and hardware. Securing mobile devices is crucial in order to avoid losses in terms of not only money but also facilities. Although mobile nodes have been developed with certain security features, some researchers have found vulnerabilities. This paper surveys in detail the security vulnerabilities of mobile IPv6 vertical handover and the current relevant mitigation methods. Furthermore, we describe the mechanism of mobile IPv6 vertical handover and its security vulnerability as well as security mechanisms proposed by researchers. Based on the survey, there are apparently weaknesses in current security features that are in need of solutions to minimize the effect of malicious activities. An open direction of future research on mobile IPv6 vertical handover security is elaborated at the end of this paper.

2014 ◽  
Vol 2014 ◽  
pp. 1-16
Author(s):  
Peer Azmat Shah ◽  
Halabi B. Hasbullah ◽  
Ibrahim A. Lawal ◽  
Abubakar Aminu Mu’azu ◽  
Low Tang Jung

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).


2018 ◽  
Vol 26 (3) ◽  
pp. 264-276 ◽  
Author(s):  
Jurjen Jansen ◽  
Paul van Schaik

Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal conditions and across time. Design/methodology/approach A pre-test post-test design was used. In the pre-test, 1,201 internet users filled out an online survey and were presented with one of three fear appeal conditions: strong fear appeal, weak fear appeal and control condition. Arguments regarding vulnerability of phishing attacks and response efficacy of vigilant online information-sharing behaviour were manipulated in the fear appeals. In the post-test, data were collected from 786 internet users and analysed with partial least squares path modelling. Findings The study found that PMT model relations hold in the domain of phishing. Self-efficacy and fear were the most important predictors of protection motivation. In general, the model results were equivalent across conditions and across time. Practical Implications It is important to consider online information-sharing behaviour because it facilitates the occurrence and success of phishing attacks. The results give practitioners more insight into important factors to address in the design of preventative measures to reduce the success of phishing attacks. Future research is needed to test how fear appeals work in real-world settings and over longer periods. Originality/value This paper is a substantial adaptation of a previous conference paper (Jansen and Van Schaik, 2017a, b).


Author(s):  
Hranovska Tetiana ◽  

The article deals with the features of the mobile learning technology emergence. The genesis of mobile learning in the field of distance and e-learning and its development in the field of blended learning are clarified. The foreign experience and research of domestic scientists on the introduction of mobile learning in the educational process of Ukrainian educational institutions are analyzed. The relevance of the application of this innovative learning technology is clarified according to carried out the literary analysis, but there is a lack of study of mobile technologies using in the educational process, in particular in natural sciences study. The author conducted an experimental study in the form of questionnaires to find out the state of mobile education in general secondary education and to identify the readiness of natural subjects’ teachers to use mobile technologies to teach students. Teachers use mobile technology in lessons, mainly for organizing work with e-textbooks and searching for material online, and less often for demonstrating video experiences in the classroom. The barriers to the use of mobile technologies are the follows: lack of information about the educational opportunities of mobile technologies, lack of methods for its use, the influence of administration policy on the educational process, as well as the age of teachers. The article presents examples of mobile technologies that are appropriate to use in teaching natural sciences. Mobile applications are analyzed and their didactic capabilities are identified during specific lesson activities. The results of the study confirmed teachers' readiness to use mobile learning, in particular by using mobile technologies during the lesson. This paper describes the advantages of mobile devices in the application of its distance learning capabilities. The prospects of using mobile technologies in the educational process during pupils study are proved. The article outlines the prospects for future research of the methodology development for using mobile devices in teaching natural subjects.


2002 ◽  
Vol 27 (3) ◽  
pp. 237-253 ◽  
Author(s):  
Eric T. Bradlow ◽  
Stephen J. Hoch ◽  
J. Wesley Hutchinson

The purpose of this article is to describe our efforts to create a test of basic computer proficiency, examine its properties using parametric test scoring methods, and identify some antecedents and consequences that accompany differences in performance. We also consider how much insight people have into their level of knowledge by examining the relationship between our tested measure of computer knowledge and self-rated knowledge scores collected at the same time. This research also adds to the large body of existing empirical work on computer literacy in the student population, by looking at computer literacy in a more general sample of the Internet-using population. A further purpose of this research, as a result, is to make our dataset available for future research.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Leonardo Aureliano-Silva ◽  
Xi Leung ◽  
Eduardo Eugênio Spers

Purpose The purpose of this study is to investigate the effect of online reviews on consumers’ intention to visit restaurants, with the moderating role of involvement. Design/methodology/approach The research framework was built on signaling theory, message appeals and involvement theory. To test the proposed framework, three experiments were conducted online with real customer samples. T-tests, ANOVA and SPSS PROCESS macro were used for data analysis. Findings The results revealed that online reviews with higher online ratings and emotional appeal led to higher restaurant visit intention. Review appeal significantly moderated the effect of online ratings on restaurant visit intention. Customers with low restaurant involvement were more impacted by emotional comments than by functional comments. Research limitations/implications The present study extends our knowledge on the effects of online reviews moderated by levels of customer involvement. By combining signaling theory with involvement theory, it adds value to the literature on customer online behavior, especially in the foodservice context. The present study has limitations that might provide opportunities for future research. It used evaluations (TripAdvisor scores) and only positive reviews (texts), so customers’ intentions considering negative reviews could not be examined. The level of hedonism concerning consumption in restaurants and prior knowledge regarding restaurant reviews was not controlled for. It is possible that the level of hedonism perceived and prior review knowledge may moderate the customers’ intention to visit the restaurant. Practical implications The present study shows the importance of online comments for the promotion of restaurants that have low evaluation scores. It is essential that restaurant owners and managers encourage potential customers by using comments to elaborate on their marketing strategies and promotion. At the same time, they should invite customers to share their emotional experiences, and not just their views on service efficiency (a functional aspect). During the COVID-19 pandemic, the use of the internet and mobile devices has become more prominent. Managers could therefore use emotional messages on the restaurant’s website or apps to attract customers with low restaurant involvement. Also, a system to identify the involvement of customers with restaurants could be implemented online or on mobile devices to present specific messages. The present study also recommends the use of online tools as virtual tours, photographs taken from different angles, smiling faces, floor plans and sittings and pre-determined emotional expressions. Also, the restaurant could promote lives on cooking different dishes to motive customer’s interaction and comments. These would help to increase customers’ visit intentions. Originality/value This study extends knowledge about the effect of restaurant online reviews (both ratings and appeals) moderated by the level of customer involvement. The present study also adds value to the customer online behavior literature showing that customers with low involvement are more sensitive to emotional content as they use the affective route to process information rather than the central route.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
Volkan Çalışkan ◽  
Özgürol Öztürk ◽  
Kerem Rızvanoğlu

Mobile technology is a new frontier for accessibility. Although mobile developers need solid guidelines to provide accessible experiences, there is a limited number of empirical research on mobile accessibility of different mobile platforms that work through various assistive technologies. In this context, more information is needed to understand both usage patterns and hardware/software platforms to guide decisions to meet the needs of people with disabilities who use mobile devices. This study, which is a pilot study of a long-term research, evaluates the accessibility of selected built-in and third party iOS applications in the iPhone and iPad through an extensive accessibility test with two blind users who are novice users of touchscreen mobile devices. This qualitative study is based on a multi-method approach, which consists of a background questionnaire, task observation, and a structured debriefing interview. The study also employs observation methods of data collection in order to gain better insight in mobile accessibility. The participants are demanded to execute three different tasks on each platform by using VoiceOver, which is the built-in screen reader in iOS. The participants are observed during the task executions and the “think aloud” procedure and video recording of the participants collected additional data. A short debriefing interview was also made to gain a detailed insight into the user experience. The findings reveal significant accessibility problems caused specifically by design of the graphical user interface features of the applications and limitations of the screen reader. Finally, as part of future research directions, preliminary guidelines are proposed to improve accessibility for iOS applications in both platforms.


Author(s):  
Kevin Wallsten ◽  
Dilyana Toteva

The expansion of the Internet and the sudden popularity of Web 2.0 applications, such as blogs, YouTube, Twitter, and Facebook, raise important questions about the extent and consequences of homophilous sorting in online political discussions. In particular, there is growing concern that Internet users' ability to filter out alternative points of view will lead political discourse to become more polarized and fragmented along ideological lines. The decline of deliberative democracy and the breakdown of America's system of representative government, the story goes, will be the inevitable causalities of political discussions moving from in-person to online. Unfortunately, the empirical research in fields such as mass communication, political science, and sociology provides no hard and fast conclusions about the amount of online homophily in political discussions. This article details this conflicted body of research and points to some areas where future research may provide more insight into the intersection of online politics and homophilous sorting.


Author(s):  
Jeffrey R. Stowell ◽  
Jordan Tanner ◽  
Erin Tomasino

This article provides an overview of using mobile technology in the classroom to enhance assessment of student learning. Although research on mobile devices in education is still in the embryonic stage, students generally have positive views about using their mobile devices for classroom polling and backchannel communication. However, there are also several challenges including the increased opportunity to be distracted when using mobile devices for other purposes, cost of the technology, and privacy concerns. The information presented will serve as a focal point for future research regarding the use of mobile technology in the classroom, and may help teachers to find new ways to reach their students.


Sign in / Sign up

Export Citation Format

Share Document