The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for mobile users and applications. Security requirements for each application are different, as well as the hardware capabilities of each device. To make things worse, wireless medium conditions may change dramatically with time, incurring great impact on performance and QoS guarantees for the application. Currently, most of the security solutions for mobile devices use a static set of algorithms and protocols for services such as cryptography and hashes. This study proposes a security service, which works as a middleware, with the ability to dynamically change the security protocols used between two peers. These changes can occur based on variations on wireless medium parameters and system resource usage, available hardware resources, application-defined QoS metrics, and desired data “ security levels”. We compare our solution to some widespread static security protocols, demonstrate how our middleware is able to adapt itself over different conditions of medium and system, and how it can provide a performance gain in the execution of cryptographic primitives, through the use of data semantics.
Table of Contact
Abstract2
Table of Contact4
Chapter15
Introduction5
Background5
Purpose Of Study6
Problem Statement6
Hypothesis6
Significance7
Chapter27
Literature Review7
The main contributions of this work are:11
Related work12
Chapter316
Methodology16
Models and definitions16
Network17
Security algorithms and protocols18
Definition 119
Definition 219
Parameters and metrics20
Definition 320
Definition 421
Table 1.23
Problem characterization27
Semantic data description30
Security Configuration31
First, we define the term Security Configuration: Definition 831
Annotation language33
Definition 934
Listing 1 LACS : Security definition example35
Listing 2 LACS : Message definition example37
Listing 3 LACS : Transmission model example40
Proposed solution42
Middleware configuration43
System design and architecture44
About the security provided by the middleware47
Implementation50
Table 2.51
Table 3.51
Protocol selection overhead54
Chapter457
Results57
Capacity of adaptation57
Chapter560
Conclusions60
Reference64
Chapter1
Introduction
Background
The tremendous advances in wireless data communication and mobile computing have created a new computing paradigm that promises to provide services anytime and anywhere for everyone. Such an environment enables users to access a wide range of services and applications using a large variety of mobile and ubiquitous devices. Voice and video streaming, file transfers, notification and localization are some examples of applications developed for this environment.
Purpose Of Study
Purpose of the study is to analyze the danger that the M-Pesa sevice can be compromised as most use g2 phone and would propose ECC to secure the transactions.
Problem Statement
A telephone company providing services in kenya and a apart of vodaphone they have a service known as m-pesa where people without bank accounts use their mobile phone to purchase services and goods. the danger is that the sevice cn be compromised as most use g2 phone and would prppose ECC to secure the transactions.
Hypothesis
We suppose a context-aware security middleware that dynamically changes the security protocols used between a pair of peer-entities according to a set of variables. Our service, named ASecMid, monitors some parameters related to the wireless medium conditions, system resource usage, hardware capabilities, application-defined QoS metrics, and desired security services. Our solution transparently chooses the best security protocol for each transmission, from a large collection of protocols, according to the parameters ...