Analysis of End-to-End SOA Security Protocols with Mobile Devices

Author(s):  
Norman Ahmed ◽  
Mark Linderman ◽  
Rose Gamble ◽  
Bharat Bahargava
Author(s):  
Yu-Sian Li ◽  
Chien-Chang Chen ◽  
Ting-An Lin ◽  
Cheng-Hsin Hsu ◽  
Yichuan Wang ◽  
...  

2006 ◽  
Vol 2 (1) ◽  
pp. 87-97 ◽  
Author(s):  
Baris Kayayurt ◽  
Tugkan Tuglular
Keyword(s):  

Information ◽  
2019 ◽  
Vol 10 (10) ◽  
pp. 299
Author(s):  
Mei Guo ◽  
Min Xiao

Recently, with the development of big data and 5G networks, the number of intelligent mobile devices has increased dramatically, therefore the data that needs to be transmitted and processed in the networks has grown exponentially. It is difficult for the end-to-end communication mechanism proposed by traditional routing algorithms to implement the massive data transmission between mobile devices. Consequently, opportunistic social networks propose that the effective data transmission process could be implemented by selecting appropriate relay nodes. At present, most existing routing algorithms find suitable next-hop nodes by comparing the similarity degree between nodes. However, when evaluating the similarity between two mobile nodes, these routing algorithms either consider the mobility similarity between nodes, or only consider the social similarity between nodes. To improve the data dissemination environment, this paper proposes an effective data transmission strategy (MSSN) utilizing mobile and social similarities in opportunistic social networks. In our proposed strategy, we first calculate the mobile similarity between neighbor nodes and destination, set a mobile similarity threshold, and compute the social similarity between the nodes whose mobile similarity is greater than the threshold. The nodes with high mobile similarity degree to the destination node are the reliable relay nodes. After simulation experiments and comparison with other existing opportunistic social networks algorithms, the results show that the delivery ratio in the proposed algorithm is 0.80 on average, the average end-to-end delay is 23.1% lower than the FCNS algorithm (A fuzzy routing-forwarding algorithm exploiting comprehensive node similarity in opportunistic social networks), and the overhead on average is 14.9% lower than the Effective Information Transmission Based on Socialization Nodes (EIMST) algorithm.


Author(s):  
Fumiko Satoh ◽  
Yuichi Nakamura ◽  
Nirmal K. Mukhi ◽  
Michiaki Tatsubori ◽  
Kouichi Ono
Keyword(s):  

2012 ◽  
pp. 333-352
Author(s):  
Fatma Meawad ◽  
Geneen Stubbs

This chapter discusses the principles underpinning the design and the development of a framework, MobiGlam, which supports ubiquitous and scalable access to learning activities. The framework allows full end to end interconnectivity among open source virtual learning environments (VLEs) and Java-enabled mobile devices. Through this framework, interoperability and adaptivity techniques are combined to address the technical, pedagogical, and institutional challenges of mobile learning. The discussed framework achieved a level of flexibility and simplicity that resulted in a wide acceptance of the framework institutionally, allowing its use in various real world settings.


2019 ◽  
Vol 2019 ◽  
pp. 1-29 ◽  
Author(s):  
Ditchaphong Phoomikiattisak ◽  
Saleem N. Bhatti

As the use of mobile devices and methods of wireless connectivity continue to increase, seamless mobility becomes more desirable and important. The current IETF Mobile IP standard relies on additional network entities for mobility management, can have poor performance, and has seen little deployment in real networks. We present a host-based mobility solution with a true end-to-end architecture using the Identifier-Locator Network Protocol (ILNP). We show how the TCP code in the Linux kernel can be extended allowing legacy TCP applications that use the standard C sockets API to operate over ILNP without requiring changes or recompilation. Our direct testbed performance comparison shows that ILNP provides better host mobility support than Mobile IPv6 in terms of session continuity, packet loss, and handoff delay for TCP.


Author(s):  
Fumiko Satoh ◽  
Yuichi Nakamura ◽  
Nirmal K. Mukhi ◽  
Michiaki Tatsubori ◽  
Kouichi Ono

The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security requirements are not considered in upstream phases and a developer at a downstream phase is responsible for writing the security configuration. However, configuring security requirements properly is quite difficult for developers because the SOA security is cross-domain and all required information is not available in the downstream phase. To resolve this problem, this chapter clarifies how to configure security in the SOA application development process and defines the developer’s roles in each phase. Additionally, it proposes a supporting technology to generate security configurations: Model-Driven Security. The authors propose a methodology for end-to-end security configuration for SOA applications and tools for generating detailed security configurations from the requirements specified in upstream phases model transformations, making it possible to configure security properly without increasing developers’ workloads.


Sign in / Sign up

Export Citation Format

Share Document