The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Before inception of Internet of Things (IoT), personal computers and laptop were used to handle daily tasks of individuals like mail surfing, access to bank portal, observing current temperature, among others. Nowadays, IoT-enabled smart devices like smart mobile phones, PDAs, and tablets are being used by them for such tasks due to rapid growth in IoT. Smart homes have been widely accepted by individuals...
Message exchange among vehicles is an integral part of communication in smart cities. Messages are exchanged to inform the other vehicles about emergency situations such as-safety alerts, and location privacy. Due to the usage of an insecure wireless medium, malicious activities in vehicles, i.e., illegal use of the false messages, can astray other vehicles. Security in communication among the vehicles...
Interworking between wireless local area network (WLAN) and the 3rd Generation Partnership Project (3GPP) such as Long Term Evolution (LTE) is facing more and more problems linked to security threats. Securing this interworking is a major challenge because of the vastly different architectures used within each network. Therefore, security is one of the major technical concerns in wireless networks...
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networks (WSNs), more widespread, used in applications such as area monitoring, industrial monitoring, vehicle detection or military monitoring. Sensor nodes have made it possible to collect...
In VANETs, security is of prime concern. A successful attack by an adversary might have disastrous effects leading to loss of life. At times an adversary may perform event modification, false event generation, data aggregation and data dropping. To overcome these we present a robust algorithm VSRP (Vehicular Security through Reputation and Plausibility checks) to employ security in VANETs. The algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.