Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Kerberos Phone Secure Messenger, Nabeel Al-Saber Jan 2008

Kerberos Phone Secure Messenger, Nabeel Al-Saber

Theses

Security is becoming vital in today's open insecure Internet. While popular Internet enabled mobile devices are spreading widely, the security of such platforms is not maturely addressed. This research extends the popular Kerberos authentication protocol to run on mobile phones and builds a novel Kerberos Secure Phone Messenger (KSPM) on top of the protocol. Moreover, the Kerberos network authentication protocol provides user authentication and message privacy with the convenience of secret key cryptography. Such an advantage in mobile phones helps reduce the computational burden and power consumption if compared with public key cryptography. KSPM achieves high standards in terms of …


Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee Jan 2008

Retransmission Strategies For Moving Networks Over Ricean Fading Channels, Alex Ruiz Lee

Theses

The problem of designing retransmission protocols based on Hybrid Automatic Repeat reQuest (HARQ) for moving networks over Ricean fading channels has been considered. The scenario of interest consists of one receiver traveling at a given speed while connected to a wireless network based on OFDM (e.g., WiMax) through several base stations located along the path. Five different retransmission protocols that combine HARQ with handover between adjacent base stations are considered. Their performance in terms of number of retransmissions per packet via numerical simulations, considering both frequency selective and nonselective channels are presented. The results obtained show the relevant advantage that …


Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin Jan 2008

Proactive Methods For Measurement Of Available Bandwidth And Link Capacity, Khondaker Musfakus Salehin

Theses

With the continuous expansion of network infrastructure and deployment of applications sensitive to Quality-of-Service, network measurement plays a major role in both network planning and management. Accurate measurement of various network parameters, e.g., available bandwidth, link capacity, delay, packet loss and jitter, provides a positive impact for effective traffic engineering, Quality-of-Service (QoS) routing, optimization of end-to-end transport performance, and link capacity planning. For network measurement, there exists several proactive estimation tools based on either probe-gap model or probe-rate model that estimate path related attributes. Most of these tools that have been implemented can measure tight-link capacity (smallest available bandwidth) and/or …


Two Factor Authentication And Authorization In Ubiquitous Mobile Computing, Qing Zhu Jan 2008

Two Factor Authentication And Authorization In Ubiquitous Mobile Computing, Qing Zhu

Theses

Handheld devices, such as mobile phones, PDAs and others, have become an integrated part of our lives. They are perfectly suitable to become the first real-life platforms for mobile computing applications. A lightweight holistic authentication and authorization scheme is presented for this typical wireless scenario. It is shown that either SIM or Kerberos authentication has its limitations. A two-factor authentication method SIM-based Kerberos authentication is developed to implement the Secure Single Sign-on function with LDAP protocol realization for authorization and mobile directory services. Performance analysis and power consumption analyses for this protocol are presented as well. Our results show that …