The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the last ten years, the progress of the Internet of Things (IoT) has continued unabated and gradually expanded into almost every corner of our daily lives. One very typical use case of IoT is the intelligent building (IB). Along with the remarkable rise of IoT, an increasing number of smart devices will be connected to IB networks, which brings many challenges to current IB network architectures...
Modern technologies of mobile computing and wireless sensing prompt the concept of pervasive social network (PSN)-based healthcare. To realize the concept, the core problem is how a PSN node can securely share health data with other nodes in the network. In this paper, we propose a secure system for PSN-based healthcare. Two protocols are designed for the system. The first one is an improved version...
There are many cases where people need to be aware of the security status of their network in order to be able to respond effectively to security risks. Most security mechanisms are however too complex and most users find it difficult to understand the system and respond effectively. There is therefore a need to design understandable security mechanisms. In this paper, we focus on the learnability...
Identity based infrastructure allows the public key of a user to be derived easily from a predefined aspect of their known identity such as a phone number, passport number or other universally unique identifier. Recently, Hölbl and Welzer have proposed an identity-based key establishment protocol. However, this protocol is found to be vulnerable to man-in-the-middle attacks and impersonation attacks...
Body sensor networks enable many interesting applications. In these applications, sensor networks always collect sensitive information, thus security is significant. Since most security mechanisms are based on identities and keys, we propose a human controlled LED-camera channel based hash key before knowledge identity and key distribution protocol. The protocol has two advantages. Firstly, the protocol...
In the following years, the desktop-based applications will be changed to cloud computing gradually. Since all users' profile and context data will be stored on the service supplier side based on their ID. ID is becoming a security bottleneck: attackers can trace all other information via user ID. Increasingly, a simple service may be involved in a chain of service clouds; each cloud is able to access...
Dynamic composition of protocol features allows applications to establish connections with custom communication characteristics. Automatically computing possible compositions and checking given compositions requires a common framework for expressing application needs, service features, and system characteristics. In this paper, we present such a framework that is based on situation calculus. We show...
In the next-generation Internet architecture, more functionality will be placed in the data path of routers in the form of "services" and other packet processing features. This trend will increase the amount of state information that is maintained by system inside the network. In this paper, we present a framework for structuring and managing network state information distributed across...
With the rapid development of network scale, the current SNMP network management model has not been able to meet requirements. Therefore, a new kind of management system and strategy must be provided to enhance the reliability and performance of the network management. This article discusses problems existed in traditional network and analyses the management system structure and management mechanism...
Advanced packet processing functions in the data path of routers are commonly used in the current Internet and are likely to expand in next-generation networks. One of the key challenges related to such ldquonetwork servicesrdquo is to develop a suitable control plane infrastructure for routing and connection setup. In this paper, we present a novel distributed algorithm and routing protocol to facilitate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.