The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Threat analysis gives how potential adversaries exploit system weakness to achieve their goals. It identifies threats and defines a risk mitigation policy for a specific architecture, functionality and configuration. In a threat analysis security metrics are a challenging requirement in order to determine the status of network security performance and to further enhance it by minimizing exposure to...
As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new applications, security emerges as a central requirement. Wireless sensor networks are vulnerable to attacks as they are frequently deployed in open and unattended environments. In this paper, we describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging...
The trend on the proliferation of handheld devices triggered an increase on the development of pervasive and personalized mobile applications that exploit and support peer-to-peer/ad-hoc networks. This creates the conditions and motivation for a mobile electronic ID system, preferably one which provides a friendly privacy solution. The existing mobile identification solutions place the interviewer...
This paper proposes a novel lightweight mechanism for a secure physical (PHY) layer in cognitive radio network (CRN) using orthogonal frequency division multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on...
Recently, Personal Networks (PNs) have been focused in supporting the userpsilas business and private activities without jeopardizing privacy and security of the users and their data. The support in business and private activities will take place through the userpsilas own personal network consisting of a core Personal Area Network (PAN) extended with clusters of remote devices which could be private,...
Sensor networks (SNs) placed on human bodies and in the environment can intelligently and unobtrusively support professional teams (for example health care professionals) to improve their work and on the other hand their subjects (for example patients and elderly at hospital or at home). In pervasive healthcare settings, protecting the privacy of the medical care subjects and the medical staff is...
Cognitive networks are intelligent networks that can automatically sense the environment and adapt the communication parameters accordingly. These types of networks have applications in dynamic spectrum access (DSA), co-existence of different wireless networks, interference management, etc. They are thought to drive the next generation of devices, protocols and applications. Clearly, the cognitive...
In this paper the authors propose a cross-layer security management plane, with a main actor security, privacy and trust manager, which addresses: a) the defined requirements taking into account the diverse application spaces and their scenarios, b) the diverse node capabilities which is a characteristic for wireless sensor networks architecture and c) the change of the context and preferences of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.