Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had schedul...Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had scheduled appointments in the health promotion center of our hospital from April 2007 to May 2007 were enrolled in the study and randomly assigned into 3 groups: control (no reminder) group,SMS text messaging reminder group and telephone reminder group. Attendance rates and costs of interventions were collected. Results: A total of 1848 participants were eligible for analysis. Attendance rates of control,SMS and telephone groups were 80.5%,87.5% and 88.3%,respectively. The attendance rates were significantly higher in SMS and telephone groups than that in the control group,with odds ratio 1.698,95% confidence interval 1.224 to 2.316,P=0.001 in the SMS group,and odds ratio 1.829,95% confidence interval 1.333 to 2.509,P<0.001 in the telephone group. However,there was no difference between the SMS group and the telephone group (P=0.670). The cost effectiveness analysis showed that the cost per attendance for the SMS group (0.31 Yuan) was significantly lower than that for the telephone group (0.48 Yuan). Conclusion: SMS and telephone are effective reminders for improving attendance rate at a health promotion center. SMS reminder may be more cost-effective compared with the telephone reminder.展开更多
The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named P...The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named Push-Styled CC. It utilizes Google cloud messaging (GCM) service as the botnet channel. Compared with traditional botnet, Push-Styled CC avoids direct communications between botmasters and bots, which makes mobile botnets more stealthy and resilient. Since mobile devices users are sensitive to battery power and traffic consumption, Push- Styled botnet also applies adaptive network connection strategy to reduce traffic consumption and cost. To prove the efficacy of our design, we implemented the prototype of Push-Style CC in Android. The experiment results show that botnet traffic can be concealed in legal GCM traffic with low traffic cost.展开更多
Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers...Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers and the public, people with a sickle cell trait experience life-threatening outcomes that are exacerbated by extreme conditions. There is a severe lack of awareness and understanding of sickle cell trait and the associated health complications among sickle cell trait carriers and healthcare providers. Purpose/Aim: Interventions that aim to improve awareness of sickle cell trait differ in approaches and are not well documented in the literature. This typology aims to highlight current efforts to inform targeted interventions that raise awareness through consistent messaging, educate people and providers on sickle cell trait and the related health complications, and support the design and implementation of comprehensive sickle cell trait awareness initiatives. Methods: We conducted a scoping review of United States-based sickle cell trait interventions and performed a content analysis to identify the categories and characteristics of these efforts. We then organized the results into a typology according to established protocols. Results: Among 164 interventions, twenty-five (15%) met the typology inclusion criteria described above and were grouped into categories: Seven of twenty-five interventions were Educational Interventions (28%), three of twenty-five interventions (12%) were Combined Screening and Educational-Based Interventions, eight of twenty-five interventions (32%) were Policy and Guideline-Based Intervention, and six of twenty-five interventions (24%) were Sickle Cell Trait Organization-Led Interventions. Conclusions: There is a lack of consistency in messaging across interventions whether delivered by credible healthcare institutions or national organizations, which can result in lack of education and awareness and confusion around sickle cell trait. Categorizing interventions through a t展开更多
Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US s...Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US society at least $13.6 billion annually and is expected to rise to $15.6 billion by 2021. The purpose of this study is to explore the feasibility of Text Messaging Intervention (TMI) in recognizing, responding and preventing IPV among college students. The research questions are: Will TMI 1) improve participant knowledge of warning signs of IPV? (Knowledge) and 2) improve participant confidence to intervene in IPV? (Confidence). Methods: A mixed methods design in data collection and data analysis was used. One-way ANOVA and Chi-square test were used to analyze quantitative data from the pre and post TMI survey. Results of the qualitative data analysis are included verbatim. Results: Results showed that knowledge level pre to post test increased from 2.00 ± 1.00 to 2.7 ± 0.48 (p < 0.001) and confidence level pre to post test increased from 2.89 ± 0.60 to 3.30 ± 0.68 (p < 0.001). Conclusions: Further research is needed in evaluating the feasibility and effectiveness of IPV prevention programs that uses mobile devices to create the best optimal health outcomes.展开更多
Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due...Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead.展开更多
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in...Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.展开更多
Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainm...Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainment of vehicle operation.The high mobility of vehicles leads to a time-varying topology between vehicles,which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles.The clustering algorithm is a method aimed at improving the efficiency of VANET communication.Currently,most of the research based on this method focuses on maintaining the stability of vehicle clustering,and few methods focus on the information interaction and collaborative decisionmaking of vehicles in the region.In this context,this paper proposes a networking method for intra-regional vehicle information interaction,through an efficient information transmission mechanism,vehicles can quickly obtain the required information and make more accurate decisions.Firstly,this networking method utilizes DBSCAN and the proposed vehicle scoring model to form clusters,ensuring the stability and adaptability of clusters;secondly,in the process of interacting with the information,the cosine similarity is utilized to check the similarity of the information to eliminate the highly similar information,effectively reducing redundant information;and lastly,in the case of a consensus reached by the cluster,the frequency of broadcasting of information between vehicles is reduced as a way to minimize the waste of communication resources.The proposed method is simulated based on Python and Sumo platforms,and several metrics such as cluster clustering situation,information volume,and state change rate are analyzed.The results show that the method maintains better cluster stability with a 60%and 92%reduction in information overhead compared to the FVC and HCAR algorithms,respectively.展开更多
This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the sam...This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.展开更多
Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to e...Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed.展开更多
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has...The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.展开更多
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan...According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.展开更多
The purpose of this paper is to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the desi...The purpose of this paper is to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the design method involves the interfacing of GSM/GPRS modem module with the vehicle ignition subsystem, and the test result shows that it performs some control actions on the vehicle subsystems from a mobile phone, having taken the advantage of the wide coverage area of some GSM networks. Hence the topic is “Remotely Controlled Vehicle Anti-theft System via GSM Network”.展开更多
基金Project supported by the Health Promotion Center of Sir Run Run Shaw Hospital, School of Medicine, Zhejiang University, China
文摘Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had scheduled appointments in the health promotion center of our hospital from April 2007 to May 2007 were enrolled in the study and randomly assigned into 3 groups: control (no reminder) group,SMS text messaging reminder group and telephone reminder group. Attendance rates and costs of interventions were collected. Results: A total of 1848 participants were eligible for analysis. Attendance rates of control,SMS and telephone groups were 80.5%,87.5% and 88.3%,respectively. The attendance rates were significantly higher in SMS and telephone groups than that in the control group,with odds ratio 1.698,95% confidence interval 1.224 to 2.316,P=0.001 in the SMS group,and odds ratio 1.829,95% confidence interval 1.333 to 2.509,P<0.001 in the telephone group. However,there was no difference between the SMS group and the telephone group (P=0.670). The cost effectiveness analysis showed that the cost per attendance for the SMS group (0.31 Yuan) was significantly lower than that for the telephone group (0.48 Yuan). Conclusion: SMS and telephone are effective reminders for improving attendance rate at a health promotion center. SMS reminder may be more cost-effective compared with the telephone reminder.
基金Supported by the National Natural Science Foundation of China (61202353, 61272084, 61272422)Graduate Innovation Foundation of Jiangsu Province (CXLX13_464)Natural Science Foundation of Jiangsu Higher Education Institutions (12KJB520008)
文摘The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named Push-Styled CC. It utilizes Google cloud messaging (GCM) service as the botnet channel. Compared with traditional botnet, Push-Styled CC avoids direct communications between botmasters and bots, which makes mobile botnets more stealthy and resilient. Since mobile devices users are sensitive to battery power and traffic consumption, Push- Styled botnet also applies adaptive network connection strategy to reduce traffic consumption and cost. To prove the efficacy of our design, we implemented the prototype of Push-Style CC in Android. The experiment results show that botnet traffic can be concealed in legal GCM traffic with low traffic cost.
文摘Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers and the public, people with a sickle cell trait experience life-threatening outcomes that are exacerbated by extreme conditions. There is a severe lack of awareness and understanding of sickle cell trait and the associated health complications among sickle cell trait carriers and healthcare providers. Purpose/Aim: Interventions that aim to improve awareness of sickle cell trait differ in approaches and are not well documented in the literature. This typology aims to highlight current efforts to inform targeted interventions that raise awareness through consistent messaging, educate people and providers on sickle cell trait and the related health complications, and support the design and implementation of comprehensive sickle cell trait awareness initiatives. Methods: We conducted a scoping review of United States-based sickle cell trait interventions and performed a content analysis to identify the categories and characteristics of these efforts. We then organized the results into a typology according to established protocols. Results: Among 164 interventions, twenty-five (15%) met the typology inclusion criteria described above and were grouped into categories: Seven of twenty-five interventions were Educational Interventions (28%), three of twenty-five interventions (12%) were Combined Screening and Educational-Based Interventions, eight of twenty-five interventions (32%) were Policy and Guideline-Based Intervention, and six of twenty-five interventions (24%) were Sickle Cell Trait Organization-Led Interventions. Conclusions: There is a lack of consistency in messaging across interventions whether delivered by credible healthcare institutions or national organizations, which can result in lack of education and awareness and confusion around sickle cell trait. Categorizing interventions through a t
文摘Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US society at least $13.6 billion annually and is expected to rise to $15.6 billion by 2021. The purpose of this study is to explore the feasibility of Text Messaging Intervention (TMI) in recognizing, responding and preventing IPV among college students. The research questions are: Will TMI 1) improve participant knowledge of warning signs of IPV? (Knowledge) and 2) improve participant confidence to intervene in IPV? (Confidence). Methods: A mixed methods design in data collection and data analysis was used. One-way ANOVA and Chi-square test were used to analyze quantitative data from the pre and post TMI survey. Results of the qualitative data analysis are included verbatim. Results: Results showed that knowledge level pre to post test increased from 2.00 ± 1.00 to 2.7 ± 0.48 (p < 0.001) and confidence level pre to post test increased from 2.89 ± 0.60 to 3.30 ± 0.68 (p < 0.001). Conclusions: Further research is needed in evaluating the feasibility and effectiveness of IPV prevention programs that uses mobile devices to create the best optimal health outcomes.
文摘Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead.
基金Supported by the National Natural Science Foundation of China (60573136)
文摘Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.
基金the National Natural Science Foundation of China(NSFC)under Grant No.52267003.
文摘Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainment of vehicle operation.The high mobility of vehicles leads to a time-varying topology between vehicles,which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles.The clustering algorithm is a method aimed at improving the efficiency of VANET communication.Currently,most of the research based on this method focuses on maintaining the stability of vehicle clustering,and few methods focus on the information interaction and collaborative decisionmaking of vehicles in the region.In this context,this paper proposes a networking method for intra-regional vehicle information interaction,through an efficient information transmission mechanism,vehicles can quickly obtain the required information and make more accurate decisions.Firstly,this networking method utilizes DBSCAN and the proposed vehicle scoring model to form clusters,ensuring the stability and adaptability of clusters;secondly,in the process of interacting with the information,the cosine similarity is utilized to check the similarity of the information to eliminate the highly similar information,effectively reducing redundant information;and lastly,in the case of a consensus reached by the cluster,the frequency of broadcasting of information between vehicles is reduced as a way to minimize the waste of communication resources.The proposed method is simulated based on Python and Sumo platforms,and several metrics such as cluster clustering situation,information volume,and state change rate are analyzed.The results show that the method maintains better cluster stability with a 60%and 92%reduction in information overhead compared to the FVC and HCAR algorithms,respectively.
文摘This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.
文摘Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed.
文摘The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.
基金This work was supported by the Mobile Police Project of China(No.J1GAB23W013)National High Technology Research and Development Program of China(863 Program,No.2007AA01Z479).
文摘According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.
文摘The purpose of this paper is to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the design method involves the interfacing of GSM/GPRS modem module with the vehicle ignition subsystem, and the test result shows that it performs some control actions on the vehicle subsystems from a mobile phone, having taken the advantage of the wide coverage area of some GSM networks. Hence the topic is “Remotely Controlled Vehicle Anti-theft System via GSM Network”.