scholarly journals SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW

TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 43-47
Author(s):  
Sigit Wibawa

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.

Author(s):  
Melva Ratchford ◽  
Omar El-Gayar ◽  
Cherie Noteboom ◽  
Yong Wang

Author(s):  
Alberto Díez Albaladejo ◽  
Fabricio Gouveia ◽  
Marius Corici ◽  
Thomas Magedanz

Next Generation Mobile Networks (NGMNs) constitute the evolution of mobile network architectures towards a common IP based network. One of the main research topics in wireless networks architectures is QoS control and provisioning. Different approaches to this issue have been described. The introduction of the NGMNs is a major trend in telecommunications, but the heterogeneity of wireless accesses increases the challenges and complicates the design of QoS control and provisioning. This chapter provides an overview of the standard architectures for QoS control in Wireless networks (e.g. UMTS, WiFi, WiMAX, CDMA2000), as well as, the issues on this all-IP environment. It provides the state-of-the-art and the latest trends for converging networks to a common architecture. It also describes the challenges that appear in the design and deployment of QoS architectures for heterogeneous accesses and the available solutions. The Evolved Core from 3GPP is analyzed and described as a suitable and promising solution addressing these challenges.


2018 ◽  
Vol 7 (4.1) ◽  
pp. 51
Author(s):  
Ala'a Saeb Al-Sherideh ◽  
Roesnita Ismail ◽  
Fauziah Abdul Wahid ◽  
Norasikin Fabil ◽  
Waidah Ismail

Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.   


Author(s):  
Mario Enrique Cueva Hurtado ◽  
Gabriela Gutierrez ◽  
Cristian Ramiro Narvaez Guillen ◽  
Francisco Javier Alvarez Pineda ◽  
Maria del Cisne Ruilova Sanchez

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Saira Beg ◽  
Saif Ur Rehman Khan ◽  
Adeel Anjum

PurposeSimilarly, Zhu et al. (2014) and Zhang et al. (2014) stated that addressing privacy concerns with the recommendation process is necessary for the healthy development of app recommendation. Recently, Xiao et al. (2020) mentioned that a lack of effective privacy policy hinders the development of personalized recommendation services. According to the reported work, privacy protection technology methods are too limited for mobile focusing on data encryption, anonymity, disturbance, elimination of redundant data to protect the recommendation process from privacy breaches. So, this situation motivated us to conduct a systematic literature review (SLR) to provide the viewpoint of privacy and security concerns as mentioned in current state-of-the-art in the mobile app recommendation domain.Design/methodology/approachIn this work, the authors have followed Kitchenham guidelines (Kitchenham and Charters, 2007) to devise the SLR process. According to the guidelines, the SLR process has three main phases: (1) define, (2) conduct the search and (3) report the results. Furthermore, the authors used systematic mapping approach as well to ensure the whole process.FindingsBased on the selected studies, the authors proposed three main thematic taxonomies, including architectural style, security and privacy strategies, and user-usage in the mobile app recommendation domain. From the studies' synthesis viewpoint, it is observed that the majority of the research efforts have focused on the movie recommendation field, while the mainly used privacy scheme is homomorphic encryption. Finally, the authors suggested a set of future research dimensions useful for the potential researchers interested to perform the research in the mobile app recommendation domain.Originality/valueThis is an SLR article, based on existing published research, where the authors identified key issues and future directions.


2009 ◽  
Vol 2009 ◽  
pp. 1-14 ◽  
Author(s):  
Alf Inge Wang ◽  
Martin Jarrett ◽  
Eivind Sorteberg

This paper describes results and experiences from designing, implementing, and testing a multiplayer real-time game over mobile networks with high latency. The paper reports on network latency and bandwidth measurements from playing the game live over GPRS, EDGE, UMTS, and WLAN using the TCP and the UDP protocols. These measurements describe the practical constraints of various wireless networks and protocols when used for mobile multiplayer game purposes. Further, the paper reports on experiences from implementing various approaches to minimize issues related to high latency. Specifically, the paper focuses on a discussion about how much of the game should run locally on the client versus on the server to minimize the load on the mobile device and obtain sufficient consistency in the game. The game was designed to reveal all kinds of implementation issues of mobile network multiplayer games. The goal of the game is for a player to push other players around and into traps where they loose their lives. The game relies heavily on collision detection between the players and game objects. The paper presents experiences from experimenting with various approaches that can be used to handle such collisions, and highlights the advantages and disadvantages of the various approaches.


2017 ◽  
Vol 27 (3) ◽  
pp. 308-321 ◽  
Author(s):  
Marcellinus C. Dike ◽  
Elizabeth L. Rose

Purpose The purpose of this paper is to map the relevant studies pertaining to internationalization in the mobile telecommunications (telecom) sector, with the aims of reflecting and categorizing what has already been studied on this topic, as a means of guiding future research. Design/methodology/approach The authors use the systematic literature review methodological approach, adopting the “Antecedents-Phenomenon-Consequences” theoretical framework as a guide. Consistent with this framework, they identify and categorize studies in the academic literature that have discussed the cross-border expansion of mobile telecom firms. Their review is based on 50 research publications, selected based on the relevance of their findings and their underlying arguments. The authors then categorized each piece’s findings and arguments into themes and sub-themes. Findings The authors find evidence that mobile network operators (MNOs) are driven into international markets by a collection of factors that can broadly be categorized as either firm-specific/country factors or the desire to capture first-mover advantages (FMAs). They also find evidence that the Uppsala stages model does not provide an appropriate explanation of MNOs’ internationalization patterns, with firms tending to skip posited stages. Market size, the regulatory environment and government policies appear to be key influences in MNOs’ choices of foreign investment locations, and despite being a driver of internationalization, FMAs often erode with the entry of competitors. MNOs tend to prefer collaborative entries over greenfield investments, especially in countries in which telecommunications infrastructure is already in place. Finally, there is no consensus with respect to whether internationality is positively associated with financial performance for MNOs. Originality/value This review of the literature offers value to both academia and practice, by providing both insights into what has already been studied with respect to the internationalization of mobile telecom firms and a guide for future research.


2021 ◽  
Vol 11 (5) ◽  
pp. 2412
Author(s):  
Stylianos Mystakidis ◽  
Eleni Berki ◽  
Juri-Petri Valtanen

Deep and meaningful learning (DML) in distant education should be an essential outcome of quality education. In this literature review, we focus on e-learning effectiveness along with the factors and conditions leading to DML when using social virtual reality environments (SVREs) in distance mode higher education (HE). Hence, a systematic literature review was conducted summarizing the findings from thirty-three empirical studies in HE between 2004 (appearance of VR) and 2019 (before coronavirus appearance). We searched for the cognitive, social, and affective aspects of DML in a research framework and studied their weight in SVREs. The findings suggest that the use of SVREs can provide authentic, simulated, cognitively challenging experiences in engaging, motivating environments for open-ended social and collaborative interactions and intentional, personalized learning. Furthermore, the findings indicate that educators and SVRE designers need to place more emphasis on the socio-cultural semiotics and emotional aspects of e-learning and ethical issues such as privacy and security. The mediating factors for DML in SVREs were accumulated and classified in the resultant Blended Model for Deep and Meaningful e-learning in SVREs. Improvement recommendations include meaningful contexts, purposeful activation, learner agency, intrinsic emotional engagement, holistic social integration, and meticulous user obstacle removal.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


Sign in / Sign up

Export Citation Format

Share Document