The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wireless sensor network's nodes are mostly distributed in the wild, and frequently in a state of unattended, therefore, the network vulnerable to various security threats. Under the condition of serious limitations in resources, the traditional network security system which needs to spend a lot of resources is no longer applicable. So, how to ensure the security of wireless sensor network under...
Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically employment of mobility nature of nodes and the storage space of all nodes. However, due to intermittent connectivity, security schemes introduced for the conventional mobile ad hoc networks (MANETs) cannot be directly deployed over ICMANs for node authentication. Therefore, this...
Mobile Ad hoc Networks (MANETs) have lots of applications. Due to the features of open medium, absence of infrastructure, dynamic changing network topology, cooperative algorithms, lack of centralized monitoring and management point, resource constraints and lack of a clear line of defense, these networks are vulnerable to attacks. A vital problem that must be solved in order to realize these applications...
Due to the telecommunication's opening, signaling system 7(SS7) network are attacked more and more for the lack of security mechanism. Source Address Spoofing has become a kind of new attack trends. After analyzing several security leaks on MTP3 layer and application layer of SS7, propose several conceivable mode of source address spoofing attack, and the technology of protecting, enhance the security...
Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with...
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this paper, we observe the detailed actions of a security association in the procedure of establishment and shift, in a wireless mesh network (WMN), i.e. a typical multi-hop network. To investigate...
Networked systems are increasingly driven by changing business needs, their management becomes even more complex. In order to adapt to changing business requirements, distributed systems switch from the traditional client-server model to a service-driven model: The internet service driven network is a new approach to the provision of network computing that concentrates on the services you want to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.