2013
DOI: 10.1109/tce.2013.6531115
|View full text |Cite
|
Sign up to set email alerts
|

Overhead of using secure wireless communications in mobile computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…These factors vary considerably even within the same network. For example, the cost in terms of time and energy of implementing cryptography mechanisms for wireless communications is different depending on the operating system and the software used [13]. Similarly, the impact of a denial of service attack on a Security Operations Center (SOC) is typically higher than that of an anti-virus solution for a personal computer.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…These factors vary considerably even within the same network. For example, the cost in terms of time and energy of implementing cryptography mechanisms for wireless communications is different depending on the operating system and the software used [13]. Similarly, the impact of a denial of service attack on a Security Operations Center (SOC) is typically higher than that of an anti-virus solution for a personal computer.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…If trustworthy considered, the security and privacy are crucial for mobile devices users including location information, online behaviour, and stored data at a time when mobile hacking and malware-contaminated applications are increasing drastically [Cachin and Schunter, 2011] [La Polla et al, 2013 [Abolfazli, et al, 2014]. Therefore, enhancing security and privacy provision in resource-constringe mobile devices tranquilize users and enrich their mobile computing experience, but decrease computing performance due to extra security-related computations and controlling overhead [Almenares et al, 2013] [ Abolfazli, et al, 2014]. In terms of application usability, offering online and offline application functionality and access to content in web and native is requested to fulfil user requirements and deliver user experience.…”
Section: ) Occ -Occasionally Connectedmentioning
confidence: 99%
“…Here, we consider the transmission of message m in (4) as an illustration to describe it. The session key K HMS −PT is shared only between PT and HMS as in (4). Therefore, only PT can decrypt c to recover m, since E(⋅) is a secure encryption algorithm.…”
Section: Privacy Preservationmentioning
confidence: 99%
“…Despite the fact that mobile health applications offer many advantages to the patient being monitored, it also leaves his/ her physiological data highly vulnerable [4]. This is because the personal and medical information is transmitted over insecure communication channels, like the Internet.…”
Section: Introductionmentioning
confidence: 99%