The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive Radio Vehicular Ad hoc Networks (CR-VANETs) utilize CR technology to increase frequency bandwidth for vehicular communications. Cooperative Spectrum Sensing (CSS) exploits spatial and temporal diversity for fast and accurate detection of Primary Users (PUs). This paper provides an overview of CSS techniques for CR-VANETs. We review state of the art CSS techniques proposed in literature highlighting...
Gold farming is a set of illicit practices in which players in massively multiplayer online games gather and distribute virtual goods for real money. Using anonymized data from a popular online game to construct networks of characters involved in gold farming, we examine the trade networks of gold farmers, their trading affiliates, and uninvolved characters at large. Our analysis of these complex...
This paper addresses the impacts of RFID (radio frequency identification) adoption on the performance of emergency management organizations. The research question queries: What are the impacts of RFID adoption on the performance of emergency management operations? In order to investigate the hypothesized impacts including reduced response time, efficient tagging and tracking, compatibility, reduced...
This paper MAGISTIC (MA-Multi Agent, GISTIC-Logistics) provides a survey of existing research on agent-based approaches to transportation and traffic management. Main focus of the paper is transport industry although we have touched other fields like medical and engineering. Idea behind research is to find out how agents are involved in logistics and what benefits they are providing us. A general...
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions...
This paper reports our ongoing work to design a context-risk-aware access control (CRAAC) model for ubiquitous computing (UbiComp) environments. CRAAC is designed to augment flexibility and generality over the current solutions. Risk assessment and authorization level of assurance play a key role in CRAAC. Through risk assessment, resources are classified into groups according to their sensitivity...
The emerging network technologies have brought an upheaval in wireless communication. Fourth generation (4G) networks are designed for better performance by utilizing high band width and better quality of service. IEEE 802.22 is one of the 4G technologies that is in draft stage and yet not deployed. Along with its spectrum sensing and spectrum accessing issues, security concerns are also getting attention...
This paper presents vulnerabilities of UMTS access domain security architecture. The security architecture of UMTS offers some protection against known threats including false base station attacks, man-in-the-middle attacks and replay attacks. The system also successfully ensures user data confidentiality and signaling data integrity. However, a few novel vulnerabilities have been identified in this...
This paper presents a review of security vulnerabilities found in IEEE 802.16e that are still unaddressed. In particular vulnerabilities leading to Denial of Service (DoS) attacks on IEEE 802.16e based network are discussed in detail. These vulnerabilities include unprotected Network entry, unencrypted management communication, unprotected management frames and weak key sharing mechanism in multicast...
Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard and it opens new horizons for security researchers. In this paper, authorization protocol for both versions of PKM in WiMAX has been analyzed. Possible attacks are also considered including interleaving, replay and suppress replay attack and a methodology is presented to...
Cognitive radio based IEEE 802.22 deploys the concept of maximum resource utilization through dynamic resource sharing. Inter base station resource sharing is dynamic process in IEEE 802.22 and is accomplished by exchange of control messages between the neighboring base stations. Insecure transmission of control channels open vulnerable holes for the denial of service attacks on base station. First...
Denial of Service (DoS) attacks pose a serious threat to wireless networks. In WiMAX a large number of authentication requests sent to the Base Station (BS) by rouge Subscriber Stations (SSs) might lead to a DoS attack. Since authentication involves exchanging and checking certificates of both parties and is a computationally heavy task, the BS would allocate most of its resources for the process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.