Abstract: Extracting and elaborating software requirements and
transforming them into viable software architecture are still an
intricate task. This paper defines a solution architecture which is
based on the blurred amalgamation of problem space and solution
space. The dependencies between domain constraints, requirements
and architecture and their importance are described that are to be
considered collectively while evolving from problem space to
solution space. This paper proposes a revised version of Twin Peaks
Model named Win Peaks Model that reconciles software
requirements and architecture in more consistent and adaptable
manner. Further the conflict between stakeholders- win-requirements
is resolved by proposed Voting methodology that is simple
adaptation of win-win requirements negotiation model and QARCC.
Abstract: In this paper methodology to exploit creeping wave
for body area network BAN communication reliability are described.
Creeping wave propagation effects are visualized & analyzed.
During this work Dipole, IA antennas various antennas were
redesigned using existing designs and their propagation
characteristics were verified for optimum performance when used on
BANs. These antennas were then applied on body shapes-including
rectangular, spherical and cylindrical so that all the effects of actual
human body can be taken nearly into account. Parametric simulation
scheme was devised so that on Body channel characterization can be
visualized at front, curved and back region. In the next phase
multiple inputs multiple output MIMO scheme was introduced where
virtual antennas were used in order to diminish the effects of
antennas on the propagation of waves. Results were, extracted and
analyzed at different heights. Finally based on comparative
measurement and analysis it was concluded that on body propagation
can be exploited to gain spatial diversity.
Abstract: Short Message Service (SMS) has grown in
popularity over the years and it has become a common way of
communication, it is a service provided through General System
for Mobile Communications (GSM) that allows users to send text
messages to others.
SMS is usually used to transport unclassified information, but
with the rise of mobile commerce it has become a popular tool for
transmitting sensitive information between the business and its
clients. By default SMS does not guarantee confidentiality and
integrity to the message content.
In the mobile communication systems, security (encryption)
offered by the network operator only applies on the wireless link.
Data delivered through the mobile core network may not be
protected. Existing end-to-end security mechanisms are provided
at application level and typically based on public key
cryptosystem.
The main concern in a public-key setting is the authenticity of
the public key; this issue can be resolved by identity-based (IDbased)
cryptography where the public key of a user can be derived
from public information that uniquely identifies the user.
This paper presents an encryption mechanism based on the IDbased
scheme using Elliptic curves to provide end-to-end security
for SMS. This mechanism has been implemented over the standard
SMS network architecture and the encryption overhead has been
estimated and compared with RSA scheme. This study indicates
that the ID-based mechanism has advantages over the RSA
mechanism in key distribution and scalability of increasing
security level for mobile service.