The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design and implementation of an Embedded Laboratory Security Monitoring System (ELSMS). The system includes a web server which acquires video information through camera, and Wireless Sensor Network (WSN) which gets environmental parameters through sensors and sends them to the web server. Users can access the Monitoring Server (MS) through PCs or Wireless Mobile Terminals(WMT)...
As WLAN security technology has shown great advantages in many fields, the research on WLAN security technology has received a very high degree concern. With flexible and easy access, wireless LAN networking has a wide range of application. To well understand WLAN security technology, researchers must pay attention to IEEE 802.11i safety standards and theirs vulnerability firstly. And the key laboratories...
Security proof of practical quantum key distribution with finite resources has attracted a lot of attentions in recent years. We give a security analysis about finite resources QKD in this paper, our method is much simper comparing with previous security analysis in finite resources case,the simulation result shows that the security analysis is reasonable in practical QKD realizations with finite...
It is an important factor for the honeypot decoy system to accurately analyze on intrusion information and precisely locate them. As there are some conflict and cooperation relationship among the collected data by honeypot system, it needs to fuse the honey information so that normal decision can be made for intrusions. The paper regarded the fusion process of honeypot information as game process...
In migrating workflow system, the migrating instance which behavior is similar to mobile agent is dispatched to execute task on the workplace, so the migrating instance faces the same security problem as the mobile agent. However, most of the present protecting mobile agent security methods are in passive ways. In this paper, we propose a model with the danger detection algorithm to protect migrating...
Userspsila character analysis and control are important for enterprise network management and security. In this paper, we propose a novel method to classify the userspsila behaviors into different security levels and control their behaviors with corresponding strategies. Firstly, Dflow model and several traffic features, including the number of packets, number of flows, flow durations, etc., are proposed...
According to the limitation of resources in wireless sensor network (WSN), this paper presents a new key pre-distribution scheme based on plane grid. It helps not only to economize the space of storage and keep low consumption, but also ensure that all neighborspsila nodes can establish pair-wise keys directly, however, has a poor safety performance. Then we extend the scheme to three-dimensional...
Rootkits Trojan virus, which can control attacked computers, delete import files and even steal password, are much popular now. Interrupt Descriptor Table (IDT) hook is rootkit technology in kernel level of Trojan. The paper makes deeply analysis on the IDT hooks handle procedure of rootkit Trojan according to previous other researchers methods. We compare its IDT structure and programs to find how...
Security is a critical requirement for the e-health system because the patient's sensitive information can be accessed remotely and this makes the entire system vulnerable to malicious attacks. In this paper, we present a novel role-interaction-organization security model and apply it to the e-health system which is modeled as a multi-agent system. The roles in our proposed model do not only determine...
Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because...
Over-encryption is a technique for managing evolving access control requirements in outsourced databases. In over-encryption, a data owner and outsourcing server collectively encrypt resources in such a way that users' accesses can be effectively controlled without the need for shipping the resources back to the owner. One potential limitation of the original over-encryption scheme is that it requires...
According to the analysis of intrusion detection model based on the Bayesian theory, an intrusion detection evaluation method was proposed. After comparison with the former related work and the analysis of the key evaluation target result, difference and quality between the performances of various intrusion detection systems were obvious. It can be proved that this performance evaluation is precise.
This paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamically rule matching tree adapt to load characteristic, reduces greatly the rule set that per packet or event need to be detected, improves the detection efficiency, can be utilized to solve...
Wireless sensor networks will be widely deployed in the future for monitoring important environmental conditions, security, and health care. One of the most important challenges in the implementation of such networks is maximizing the area detected and minimizing energy dissipation in the movement. In this paper, we present some effective methodology for modeling the problem of maximum cover and minimizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.