The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing and virtualization go hand in hand and have provided unlimited opportunities for Information Technology (IT) to achieve dynamicity and flexibility in the provisioning of value based services to the cloud end users including large business enterprises. However one of the primary obstacles to widespread acceptance of the cloud are the complex issues of security and the consequent lack...
Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness...
Cloud federation is the way to integrate various cloud data centers from a single vendor or multiple vendors for better resource sharing. This paper looks in to various cloud federation aspects with associated challenges and solutions. Few key challenges mentioned are networking delay, data corruption while transit, handling the control signal, security, QoS guarantees, etc. Various state of the art...
Secure group communication is a central research issue in wireless networks. The security of collaborative work or group oriented applications such as pay per TV, secure video conferencing in wireless networks rely on the effective group key management technique which satisfies the security requirements. This paper presents a survey of three types of group key management based on the involvement of...
The IP-based Internet of Things refers to the pervasive interactions of smart objects and people enabling new applications by means of IP protocols. An application scenario is a Smart City in which the city infrastructure, cars, and people exchange information to enable new services. IP protocols, such as IPv6, TCP and HTTP will be further complemented by IPv6 over Low power Wireless Personal Area...
The IP-based Internet of Things refers to the interconnection of smart devices in a Low-power and Lossy Network (LLN) with the Internet by means of protocols such as 6LoWPAN or CoAP. The mechanisms to protect the LLN from attacks from the Internet and provisioning of an end-to-end (E2E) secure connection are key requirements for functionalities ranging from network access to software updates. Interconnecting...
WSNs are multihop networks, which depend on the intermediate nodes to relay the data packet to the destination. These nodes are equipped with lesser memory, limited battery power, little computation capability, small range of communication and need a secured and efficient routing path to forward the incoming packet. In this paper, we propose a secure cluster based multipath routing protocol (SCMRP)...
The important issue of modern communication is establishing secret communication while using public channel and is achieved by steganography. In this paper, we propose Coherent Steganographic Technique using Segmentation and Discrete Cosine Transform (CSSDCT). The cover image is divided into 8*8 blocks and DCT is applied on each block. The number of payload MSB bits is embedded into DCT coefficients...
The increasing complexity of system-on-chip devices has made verification of these devices an extremely difficult task. Additionally, there is the pressure of time-to-market that is faced by all semiconductor companies. Some of the functional complexity of such devices has made it necessary to run system level sequences that were typically run only in post-silicon phase in the pre-silicon stages....
Web service security is one of the important areas of research both in industry as well as in academia. SOAP messages with XML signatures under Web service security specification provide secure message exchange solutions in SOA based applications. Recent researches established that the solutions based on the specification have several limitations. XML rewriting attacks on SOAP messages exposed the...
TCP-SYN attack is one of the commonly used DDoS attacks aimed at bringing down a computer system connected to Internet. There has been an increased targeting of Windows end-users and servers. The attackers and intruders are leveraging easily identifiable network blocks to target and exploit Windows end-user servers and computer systems. In order to provide some level of security and protection against...
Modern deep packet inspection systems use regular expressions to define various patterns of interest in network data streams. Deterministic finite automata (DFA) are commonly used to parse regular expressions. DFAs are fast, but can require prohibitively large amounts of memory for patterns arising in network applications. Traditional DFA table compression only slightly reduces the memory required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.