The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confident of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. If such attacks become successful,...
Due to the recent security infringement incidents of single factor authentication services, there is an inclination towards the use of multi-factor authentication (MFA) mechanisms. These MFA mechanisms should be available to use on modern hand-held computing devices like smart phones due to their big share in computational devices market. Moreover, the high social acceptability and ubiquitous nature...
Wireless Sensor Networks (WSNs) are being used everywhere around us whether it be a smart office or an application related to environmental monitoring, healthcare, surveillance, education and training. Most of the time such application domains involve handling of sensitive data that would require secure dissemination of information from sensor node to the data collection point (target node). However,...
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges...
Despite well-defined and commercially viable security standards for WiMAX networks, vulnerability in current system design and other inherent characteristics expose the network to various types of security attacks. These attacks are commonly related to network access security, authentication of users, validation of data transmission, and confidentiality issues. In order to provide better protection...
A PMIPv6 supports mobile node (MN) mobility management in a localized domain over the wireless local area network (WLAN). The standard PMIPv6 mobility related signalling are adopted in reactive mode, which results in long services disruption and unavoidable data traffic loss, thus, harmfully affects the MN's communication performance. In this article, we propose a proactive low loss traffic mechanism,...
Smart cards have been used in a wide variety of vertical markets delivering security services related to physical access control, user authentication and high value data transactions. However, their adoption in plug-n-play removable data storage markets is generally hindered by their dependence on external smart card reader hardware, their proprietary communication protocol that requires installation...
IEEE 802.11X, which is a key part of IEEE 802.11i, employs extensible authentication protocol (EAP) to support a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment and security requirements. While offering more flexibility by leaving the selection of a suitable...
The rapid growth of Wi-Fi networks in recent years has driven both industry and the relevant standards body to respond to the flaws and security problems of the underpinning standard (IEEE 802.11) and in particular to address the problems associated with the Wi-Fi access mechanisms. While IEEE 802.11 task group i developed a new wireless security protocol, IEEE 802.11i also known as robust security...
The mobility support protocols are separated by two categories; First, Host-based mobility management protocols such as Mobile IPv6, and its enhancements (HMIPv6 and FMIPv6) which all basically requires protocol stack modification of the mobile node in order to support them. That modification may increase the complexity on them and wasting of air resource. Besides, some drawbacks that still suffers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.