The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.
{"title":"Mobile agent security","authors":"N. Borselius","doi":"10.1049/ECEJ:20020504","DOIUrl":"https://doi.org/10.1049/ECEJ:20020504","url":null,"abstract":"The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.
{"title":"The smartcard as a mobile security device","authors":"D. Scheuermann","doi":"10.1049/ECEJ:20020503","DOIUrl":"https://doi.org/10.1049/ECEJ:20020503","url":null,"abstract":"Modern society would like to replace paper by electronic data carriers and mechanical processes by electronic processes. Smartcards offer one means to this end in the form of a personal mobile security device. Personal data can be stored in a mobile personal environment instead of in a central database, and processor smartcards additionally provide a sort of pocket PC that can perform security functions at a higher level of security than an ordinary PC. Interoperability of different smartcards with different smartcard readers and data terminals is very important; therefore, standards exist for the structure of data objects on the card and for coding the commands sent to the card. Biometric user-authentication is becoming increasingly important for smartcards as an alternative to the previously used PIN or password authentication. Additional convenience for the user can be provided by contactless cards.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.
{"title":"Secure mobile commerce","authors":"S. Schwiderski-Grosche, H. Knospe","doi":"10.1049/ECEJ:20020506","DOIUrl":"https://doi.org/10.1049/ECEJ:20020506","url":null,"abstract":"M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.
{"title":"Security issues for downloaded code in mobile phones","authors":"D. Babb, C. Bishop, T. Dodgson","doi":"10.1049/ECEJ:20020505","DOIUrl":"https://doi.org/10.1049/ECEJ:20020505","url":null,"abstract":"'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security
{"title":"Security for mobility","authors":"C. Mitchell","doi":"10.1049/ECEJ:20020508","DOIUrl":"https://doi.org/10.1049/ECEJ:20020508","url":null,"abstract":"* Part I: Underlying technologies * Chapter 1: Cryptography for mobile security * Chapter 2: PKI in mobile systems * Chapter 3: The personal PKI * Chapter 4: The smartcard as a mobile security device * Chapter 5: Secure mobile tokens - the future * Part II: Network security * Chapter 6: UMTS security * Chapter 7: Securing network access in future mobile systems * Chapter 8: Public key based network access * Chapter 9: Security in personal area networks * Chapter 10: Towards the security of routing in ad hoc networks * Chapter 11: Security issues in a MobileIPv6 network * Part III: Mobile code issues * Chapter 12: Security for agent systems and mobile agents * Chapter 13: Security issues for downloaded code in mobile phones * Part IV: Application security * Chapter 14: Secure mobile commerce * Chapter 15: Securing the delivery of digital content over the Internet * Chapter 16: Security for future standardised DRM * Part V: The future * Chapter 17: Pioneering advanced mobile privacy and security","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood
This paper looks at the security issues that arise for the browsing, selection and delivery of digital content over the Internet. Particular emphasis is placed on the problems of finding security solutions for microtransactions (small items of content) and micropayments (low-value content), and the digital rights management issues concerning the protection of content after it has been delivered to consumers. The paper concludes with a description of the secure content delivery system developed during the SIBIS project, which addresses many of the issues raised.
{"title":"Securing the delivery of digital content over the Internet","authors":"A. Waller, Glyn Jones, T. Whitley, J. Edwards, D. Kaleshi, A. Munro, B. MacFarlane, A. Wood","doi":"10.1049/ECEJ:20020507","DOIUrl":"https://doi.org/10.1049/ECEJ:20020507","url":null,"abstract":"This paper looks at the security issues that arise for the browsing, selection and delivery of digital content over the Internet. Particular emphasis is placed on the problems of finding security solutions for microtransactions (small items of content) and micropayments (low-value content), and the digital rights management issues concerning the protection of content after it has been delivered to consumers. The paper concludes with a description of the secure content delivery system developed during the SIBIS project, which addresses many of the issues raised.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright
In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.
{"title":"Public key infrastructure in mobile systems","authors":"J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright","doi":"10.1049/ECEJ:20020501","DOIUrl":"https://doi.org/10.1049/ECEJ:20020501","url":null,"abstract":"In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The introduction of new telematics and broadcast systems into vehicles has led to a requirement for multiple antennas that can be hidden from view. This paper commences by presenting the results of simulations to identify the components of a car's structure that influence the radiation pattern of a printed VHF antenna on the rear windscreen. Two dual-band antenna designs are then presented for operation in the 900 and 1800 MHz telephone bands. The first is a planar inverted-F antenna that can be concealed in the bumpers, the second a hybrid structure based on the top-loaded monopole principle and mounted beneath the vehicle's roof.
{"title":"Hidden antennas for vehicles","authors":"R. Langley, J. Batchelor","doi":"10.1049/ECEJ:20020601","DOIUrl":"https://doi.org/10.1049/ECEJ:20020601","url":null,"abstract":"The introduction of new telematics and broadcast systems into vehicles has led to a requirement for multiple antennas that can be hidden from view. This paper commences by presenting the results of simulations to identify the components of a car's structure that influence the radiation pattern of a printed VHF antenna on the rear windscreen. Two dual-band antenna designs are then presented for operation in the 900 and 1800 MHz telephone bands. The first is a planar inverted-F antenna that can be concealed in the bumpers, the second a hybrid structure based on the top-loaded monopole principle and mounted beneath the vehicle's roof.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper addresses some of the potential opportunities for achieving advances in radar systems and technology. It is not a summary of current interests in radar, nor is it a forecast of what 'will be', but is speculation about what 'could be' based on the limited experiences and personal biases of the writer. Included are the replacement of existing radars that have been in use for some time, 'on-the-shelf' concepts and demonstrated technology that have yet to be employed, a few new directions that might offer capabilities that do not currently exist, and areas of basic technology that could be further explored to provide new understanding and new capabilities. Although much is included in the paper, it is not meant to be an exhaustive enumeration of the many possible directions for future radar.
{"title":"Opportunities in radar-2002","authors":"M. Skolnik","doi":"10.1049/ECEJ:20020602","DOIUrl":"https://doi.org/10.1049/ECEJ:20020602","url":null,"abstract":"This paper addresses some of the potential opportunities for achieving advances in radar systems and technology. It is not a summary of current interests in radar, nor is it a forecast of what 'will be', but is speculation about what 'could be' based on the limited experiences and personal biases of the writer. Included are the replacement of existing radars that have been in use for some time, 'on-the-shelf' concepts and demonstrated technology that have yet to be employed, a few new directions that might offer capabilities that do not currently exist, and areas of basic technology that could be further explored to provide new understanding and new capabilities. Although much is included in the paper, it is not meant to be an exhaustive enumeration of the many possible directions for future radar.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}