Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Singapore Management University

2014

Mobile computing

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University Oct 2014

Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University

SMU Press Releases

The Singapore Management University (SMU) has announced today the establishment of a new centre of research excellence that focuses on mobile computing security. Funded by Singapore’s National Research Foundation (NRF), the Secure Mobile Centre is developing efficient and scalable technologies and solutions that strengthen the security of mobile computing systems, applications and services. The Secure Mobile Centre is led by a team of five faculty members from SMU’s School of Information Systems who specialise in information security and trust: Professor Robert DENG (Centre Director), Professor PANG Hwee Hwa, Associate Professor LI Yingjiu, Associate Professor DING Xuhua and Assistant Professor Debin …


Livelabs: Building An In-Situ Real-Time Mobile Experimentation Testbed, Rajesh Krishna Balan, Archan Misra, Youngki Lee Feb 2014

Livelabs: Building An In-Situ Real-Time Mobile Experimentation Testbed, Rajesh Krishna Balan, Archan Misra, Youngki Lee

Research Collection School Of Computing and Information Systems

We present LiveLabs, a mobile experimentation testbed that is currently deployed across our university campus with further deployments at a large shopping mall, a commercial airport, and a resort island soon to follow. The key goal of LiveLabs is to allow in-situ real-time experimentation of mobile applications and services that require context-specific triggers with real participants on their actual smart phones. We describe how LiveLabs works, and then explain the novel R&D required to realise it. We end with a descriptionof the current LiveLabs status (> 700 active participants to date) as well as present some key lessons learned.


Barometric Phone Sensors: More Hype Than Hope!, Kartik Muralidharan, Azeem Javed Khan, Archan Misra, Rajesh Krishna Balan, Sharad Agarwal Feb 2014

Barometric Phone Sensors: More Hype Than Hope!, Kartik Muralidharan, Azeem Javed Khan, Archan Misra, Rajesh Krishna Balan, Sharad Agarwal

Research Collection School Of Computing and Information Systems

The inclusion of the barometer sensor in smartphones signaled an opportunity for aiding indoor localization efforts. In this paper, we therefore investigate a possible use of the barometer sensor for detecting vertically oriented activities. We start by showing the accuracies of various commodity measurement devices and the challenges they bring forth. We then show how to use the barometer values to build a predictor that can detect floor changes and the mode (elevator, escalator, or stairs) used to change floors with nearly 100% accuracy. We validate these properties with data collected using 3 different measurement devices from 7 different buildings. …


A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang Jan 2014

A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart cardï based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this paper, we reanalyze the security of Das' scheme, and show that the scheme is in fact insecure against impersonation attacks. We then propose a new smart cardï based anonymous user authentication protocol for wireless communications. Compared with the existing …