Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
In order to improve the dynamic and scalability of grid, the paper adopts the way fusing P2P and Grid organically, which resolves the issue that the node can join randomly and the resource-sharing can be dynamic in gird. This paper builds a resource architecture model based on P2PGrid and proposes a resource discovery algorithm fusing DHT and ant colony algorithm. This algorithm can accurately and...
A hierarchical of 160-bit 1D space is constructed based on the node's location information (network heterogeneous) and the node's processing capability (node heterogeneous) etc. The problem of the topology consistency is solved by making the hierarchical 1D space compatible with that of the physical network. The relay of weighed reputation method is used to realize the storage and collection of the...
A hierarchical of 160-bit ID space is constructed based on the node's location information (network heterogeneous) and the node's processing capability (node heterogeneous) etc. The problem of the topology consistency is solved by making the hierarchical ID space compatible with that of the physical network. The relay of weighed reputation method is used to realize the storage and collection of the...
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network,...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
Nowadays, P2P file-sharing systems have gained a large acceptance among the Internet users. However, there has been little relatively work done in access control for P2P networks, where security is a critical requirement for broader applications of the technology not only in the current but also in the future. In this work, a new architecture is presented in this paper, it integrates the aspects of...
Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, a sink. In such a disconnected or unattended setting, nodes must accumulate sensed data until it can be off loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real danger of node and data compromise. The unattended nature of the network makes...
Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor network security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribution...
Information security is very important in mobile ad- hoc network, especially when the network is applied in security- demanded situation. Due to lower bandwidth and longer delay, wireless network is inefficient when cryptographic method is implemented during data transmission. In this article, a novel method of soft encryption is proposed for multi-path routing data transmission. All messages are...
Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions to overcome the limitation of wireless network security is the IEEE 802.1X specification, a mechanism for...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.