The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hierarchical wireless sensor networks (HSNs) have been widely used in many applications, especially in military areas. They usually consist of different types of nodes and behave better in performances and reliability than traditional flat wireless sensor networks (FSNs). In this paper, a novel key pre-distribution scheme is proposed for a three-tier HSN. Shamir's secret sharing technique is implemented...
In order to enhance the security of vehicular ad hoc networks (VANETs). By dividing the roadside units (RSUs) into application-RSUs (AP-RSUs) and authentication-RSUs (AU-RSUs) in application layer, we give a new security scheme for VANETs. This functional division of RSUs makes VANETs more logically clear. AU-RSUs record vehicles' real identities and assign temporary certificates to them. The temporary...
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don't offer user's end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates...
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy...
In vehicular ad hoc networks (VANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Trust propagation is the principle by which new trust relationships can be derived from pre-existing trust relationship. Modeling for trust propagation is a fundamental block in an ad hoc environment. The main contribution of this work is a novel scheme to enhancing...
Recently trusted network becomes hot topic in network security domain. By introducing the concept of "trusted attribute", we proposed grade division scheme, which was called hierarchy trusted network framework (HTNF). Also we detailedly explained the partition rules of trusted attributes and the approach to grade division. We discussed the potential applications of presented framework, and...
The benefits of Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative relay for secure communication are investigated within Wyner's wiretap channel. We characterize the secrecy rate when source, destination, relay and eavesdropper all use single antenna and the channel conditions are fix. Both AF and DF cooperative strategies are proved theoretically to be able to facilitate secure communication...
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations...
A new and feasible trusted remediation model was put forward, and the functions as well as the work flow of remediation model were explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation...
In this paper, a novel probabilistic computational reputation based trust model is firstly introduced, which has the property of separating reputations between providing services and giving feedbacks. And then a topology adaptation protocol for unstructured P2P overlays is proposed based on this trust model. The basic principle of this adaptation protocol is that peers with higher service and feedback...
Peer-to-peer overlay is self-organized by individual hosts in the Internet. The overlay usually serves for collaboration-oriented applications and necessitates group communication. Consequently, anonymity is demanded in scenarios such as military, government applications for privacy protection. It prevents communicating party identity from being revealed by others. In this paper we propose Bus-based...
Plenty of applications and services for personal communications in wireless mobile networks (WMN) are brought up recently, such as mobile commerce applications and teleconference applications. So the end-to-end security requirements are necessary. Nevertheless WMN don't offer end- to-end confidentiality and integrity mechanism for personal communications. The linchpin of end-to-end security is the...
In this paper, we propose the multicast security based on session initial protocol (MSSIP), which introduces the IETF session initial protocol (SIP) into the multicast security model, to achieve source and receiver access control, source authentication and secure communication. By the multicast control servers (MCS) deployed on the edge of a core network, the MSSIP offers a scaleable and extensible...
Through analyzing the changes of key services' performance index value before and after evaluation, this paper proposed a novel quantitative analysis method for network survivability based on grey relational analysis. Starting with the normalization of decision matrix with interval number, the proposed method firstly applied grey relational analysis to assess the best affiliate degree and survival...
Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective technique is an important problem. This paper takes the requirement of emergency response as its research background, and a new algorithm is proposed based on resource reconfiguration. The algorithm focuses on the time of emergency response and the...
Wireless sensor networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit their environment. Secure communication between these distributed wireless devices is a desired characteristic, especially in scenarios where these sensors will be exploited for military and other mission-critical operations. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.