MPEG: a video compression standard for multimedia applications
Communications of the ACM - Special issue on digital multimedia systems
Online computation and competitive analysis
Online computation and competitive analysis
Cryptographic security Techniques for wireless networks
ACM SIGOPS Operating Systems Review
Sequential abstract-state machines capture sequential algorithms
ACM Transactions on Computational Logic (TOCL)
Challenges designing next-generation middleware systems
Communications of the ACM - Adaptive middleware
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
XMIDDLE: A Data-Sharing Middleware for Mobile Computing
Wireless Personal Communications: An International Journal
Exploiting reflection in mobile computing middleware
ACM SIGMOBILE Mobile Computing and Communications Review
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Honest Ideals on Strand Spaces
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Middleware for Mobile Computing: Awareness vs. Transparency
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Wireless Security Is Different
Computer
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
SAINT '05 Proceedings of the The 2005 Symposium on Applications and the Internet
Wireless security techniques: an overview
Proceedings of the 1st annual conference on Information security curriculum development
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Wireless hotspots: petri dish of wireless security
Communications of the ACM - Hacking and innovation
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications
IEEE Transactions on Software Engineering
Enhanced cross-layer based middleware for mobile ad hoc networks
Journal of Network and Computer Applications
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Access and service convergence over the mobile internet - A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scheduling security-critical multimedia applications in heterogeneous networks
Computer Communications
New directions in cryptography
IEEE Transactions on Information Theory
IEEE Transactions on Consumer Electronics
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |
The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for mobile users and applications. Security requirements for each application are different, as well as the hardware capabilities of each device. To make things worse, wireless medium conditions may change dramatically with time, incurring great impact on performance and QoS guarantees for the application. Currently, most of the security solutions for mobile devices use a static set of algorithms and protocols for services such as cryptography and hashes. In this work we propose a security service, which works as a middleware, with the ability to dynamically change the security protocols used between two peers. These changes can occur based on variations on wireless medium parameters and system resource usage, available hardware resources, application-defined QoS metrics, and desired data ''security levels''. We compare our solution to some widespread static security protocols, demonstrate how our middleware is able to adapt itself over different conditions of medium and system, and how it can provide a performance gain in the execution of cryptographic primitives, through the use of data semantics.