Please use this identifier to cite or link to this item:
Title: Enhanced Security Framework for Ubiquitous Computing
Researcher: Kaleem Ahmed Usmani
Guide(s): Nupur Prakash
University: Guru Gobind Singh Indraprastha University
Completed Date: 08/2014
Abstract: Ubiquitous Computing and Communications is a revolutionary paradigm that aims to provide newlinepervasive and reliable computing solutions and communication services anytime and newlineanywhere. This emerging technology is built upon the rapid research and development newlineadvances in a wide range of key areas including wireless and sensor networks, mobile and newlinedistributed computing, embedded systems, agent technologies, autonomic communication, newlineand information security. As the adoption of the Ubiquitous Computing is growing with a newlinerapid pace, its security is becoming a major concern and needs to be addressed. In this newlineresearch work, security issues of ubiquitous computing environment have been addressed and newlineanalyzed. newlineIn addition to the security issues related to wireless networks, there are numerous problems newlinerelated to security of wired and wireless networks in Ubiquitous computing environments. newlineMany of these issues arise because such systems are often distributed, wireless and ad-hoc in newlinenature. To address the various security issues, a traffic monitoring framework has been newlineproposed to evaluate the security risks, to handle the security breaches, to design the security newlinepolicy and to provide an effective business continuity plan in case of cyber disasters in a newlinebetter way. newlineThe proposed framework is an improved version of RSP model which is based on newlinemethodologies of SANS, NIST, CERT and ISO model. This framework overcomes the newlinedeficiencies and gaps of the RSP model by incorporating disaster recovery and business newlinecontinuity plan and improved approach for incident handling. This framework consists of newlinethree interdependent layers. The Layer 1 comprises of the stakeholders such as ISPs, Ministry newlineof ICT and Co-ordination Centre involved in implementing the framework. The Layer 2 is the core layer which provides the mechanism for its implementation and includes legal framework, Policies and Procedures, Standards and Certifications, Service Level Agreement, newlineCompliance and Enforcement and Disaster Recovery and Business Continuity Plan.
Appears in Departments:University School of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
01_cover page.pdfAttached File116.39 kBAdobe PDFView/Open
02_certificate.pdf70.44 kBAdobe PDFView/Open
03_acknowledgement.pdf72.46 kBAdobe PDFView/Open
04_abstract.pdf69.66 kBAdobe PDFView/Open
05_toc.pdf91.34 kBAdobe PDFView/Open
06_list of figures.pdf96.17 kBAdobe PDFView/Open
07_list of tables.pdf79.19 kBAdobe PDFView/Open
08_author publications.pdf84.82 kBAdobe PDFView/Open
09_list of abbreviations symbols.pdf65.89 kBAdobe PDFView/Open
10_chapter-01.pdf122.1 kBAdobe PDFView/Open
11_chapter-02.pdf229.76 kBAdobe PDFView/Open
12_chapter-03.pdf250.66 kBAdobe PDFView/Open
13_chapter-04.pdf334.57 kBAdobe PDFView/Open
14_chapter-05.pdf226.88 kBAdobe PDFView/Open
15_chapter-06.pdf462.74 kBAdobe PDFView/Open
16_chapter-07.pdf95.2 kBAdobe PDFView/Open
17_bibliography.pdf109.44 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: