Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World
نویسندگان
چکیده
Thanks to smartphones’ mass popularity in our society, our world is surrounded by ubiquitous electronic signals. These signals originate from static objects such as buildings and stores and mobile objects such as people or vehicles. Yet it is difficult to readily access electronic information. Current wireless communications focus on reliable transmission from sources to destinations, which entails tedious connection establishment and network configuration. This forms a virtual electronic barrier among people that makes unobtrusive communication difficult. In addition, there is concern about interacting with the electronic world due to such interactions’ insecurity. To safely remove the electronic barrier, we propose Enclave, a delegate wireless device that helps people’s smartphones communicate unobtrusively. We realize Enclave using two key supporting technologies, NameCast and PicComm. NameCast uses wireless device names to unobtrusively transmit short messages without connection establishment. PicComm uses the transfer of visual images to securely deliver electronic information to people’s smartphones. We implement Enclave on commercial off-the-shelf smartphones. Our experimental evaluation illustrates its potential for smartphone data protection and unobtrusive and secure communication.
منابع مشابه
From E-learning to Ubiquitous Learning; Theoretical Principles
Background: Because of approaches to learning in every place and at any time, ubiquitous learning with knowledge of the context and framework, and due to the development of wireless technologies and sensors, the learning process has changed. Mobile learning and ubiquitous learning as models of e-learning that refer to the acquisition of knowledge, attitudes and skills through wireless technolog...
متن کاملAnalysis and Design of an Advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet
Electronic payment systems are of paramount importance in our current digital society. Security and privacy constitute crucial challenges in this area. Electronic money is indeed just digital information that can easily be copied. Moreover, users automatically leave an electronic trail of all their activities in the digital world. In this thesis an advanced infrastructure for secure and anonymo...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کامل