Explore chapters and articles related to this topic
Emerging Technologies and Associated Terminologies
Published in Amalendu Chatterjee, Autonomous and Integrated Parking and Transportation Services, 2019
Technology impacts on the parking industry came onto my radar as a serendipity. My friend and I started a company in 1999, Eximsoft International, to develop mobile applications. Our first project was with Ericsson – to develop a secured mobile e-commerce following an early mobile electronic transaction (MeT) standard. We successfully integrated MeT and the Wireless Public Key Infrastructure (WPKI) of Entrust in one of Ericsson’s mobile telephone sets for secured transactions – a prelude to the commercial mobile e-commerce of today. The model has been showcased in international conferences as well as in the North Carolina Technology Association (NCTA). The success of the project led us to explore jointly the potential of future mobile applications – the real market killer. During our research, cellphone-based game technology was very hot but we wanted to go beyond the child’s paradigm. All team members agreed to investigate mobile parking and transportation services. The last nineteen years of research have led to this book. Exact correlations may not be obvious unless all aspects of the vehicular, parking, and transportation industries are properly reviewed to set the context. The context will hopefully help implementers, and decision/policy makers to study the subject further for its economic and social benefits.
Security in Wireless Multimedia Communications
Published in K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz, Wireless Multimedia Communication Systems, 2017
K. R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
The EPS AKA protocol has some improvements over the UMTS AKA so that it can prevent some security attacks such as redirection attacks, rogue base station attacks, and man-in-the-middle (MitM) attacks. However, there are still some weaknesses in the current LTE security mechanism [27], for example, lack of privacy protection and DoS attacks prevention in the EPS AKA scheme. As an improvement, a security-enhanced AKA (SE-EPS AKA) scheme based on wireless public key infrastructure (WPKI) has been proposed [28]. The scheme ensures the security of user identity and the exchanged message with limited energy consumption by using elliptic curve cipher encryption.
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
Published in Connection Science, 2021
Shaik Shakeel Ahamad, Al-Sakib Khan Pathan
CCH and patients are connected via 4G/5G ensuring communication security using Transport Layer Security (TLS) protocol. Application security is ensured using AES (Advanced Encryption Standard) and ECDSA (Elliptic Curve Digital Signature Algorithm). Certifying Authority (CA) serves as a Trusted Service Manager (TSM) (Ahamad & Pathan, 2019) in addition to its usual functions. Community Cloud here is controlled and shared by multiple organisations. Several owners can have some common interest and hence, it could be managed by a committee of owners or a third party – even can be located at a distant place. The legitimate members of the community would be given access to the data in the cloud. Wireless Public Key Infrastructure (WPKI) is implemented in this framework. Healthcare applications in BSN and UICC are personalised by the CCH using OTA. CCH updates the firmware in the SE of BSN and MNO updates the firmware in the UICC.