A Novel Security Architecture for Peer-to-Peer IMS System

2013 ◽  
Vol 664 ◽  
pp. 1076-1081
Author(s):  
Xin Chen

Recently, some proposals suggest to use a peer-to-peer network instead of servers to facilitate SIP user registration and location in IMS communication systems. Due to the lack of central authority, security issue becomes one of the main problems in such P2P IMS systems. In this paper, we propose a novel security architecture for P2P IMS system. By using this architecture, our P2P IMS system becomes a fully distributed secure system in which there is not a central server indeed. Furthermore, our system is a scalable system which is capable of anonymous yet accountable real time communication based on SIP protocol which enables the system compatible with any existing IMS systems.

2015 ◽  
Vol 764-765 ◽  
pp. 950-954
Author(s):  
Chih Kun Ke ◽  
Zheng Hua Lin

In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.


First Monday ◽  
2015 ◽  
Author(s):  
John Brock ◽  
Donald J. Patterson

The proliferation of sensors in the world has created increased opportunities for context-aware applications. However, it is often cumbersome to capitalize on these opportunities due to the difficulties inherent in collecting, fusing, and reasoning with data from a heterogeneous set of distributed sensors. The fabric that connects sensors lacks resilience and fault tolerance in the face of infrastructure intermittency. To address these difficulties, we introduce Cacophony, a network of peer-to-peer nodes (CNodes), where each node provides real-time predictions of a specified set of sensor data. The predictions from each of the Cacophony prediction nodes can be used by any application with access to the Web. Creating a new CNode involves three steps: (1) Developers and domain-knowledge experts, via a simple Web UI, specify which sensor data they care about. Possible sources of sensor data include stationary sensors, mobile sensors, and the real-time Web; (2) The CNode automatically aggregates data from the relevant sensors in real time using a JXTA-based peer-to-peer network; and, (3) The CNode uses the aggregated data to train a prediction model via the Weka machine-learning library (Hall, et al., 2009). Real-time predictions made by the CNode are then made publicly available to applications that wish to use data from a CNode’s particular set of sensors. The real-time predictions themselves can also be used recursively as sensor data, enabling the creation of CNodes that make predictions based on other CNodes.


2014 ◽  
Vol 1 (3) ◽  
pp. 266-275 ◽  
Author(s):  
Nasser Hasan Ali ◽  
Borhanuddin Mohd. Ali ◽  
Mohammed A. Abdala ◽  
Mohammad Lutfi Othman ◽  
Fazirulhisyam b. Hashim

2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

2013 ◽  
Vol 9 ◽  
pp. 215-225 ◽  
Author(s):  
Tadeu Classe ◽  
Regina Braga ◽  
Fernanda Campos ◽  
José Maria N. David

Sign in / Sign up

Export Citation Format

Share Document