The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In vehicular ad hoc networks (VANETs), security always comes with a price in terms of QoS performance degradation. In this paper, we take an integrated approach of optimizing both security and QoS parameters, and study the tradeoffs between them in VANETs. Specifically, we use recent advances in cooperative communication to enhance the QoS performance of VANETs. In addition, we present a prevention-based...
with the development of information technology, VPN technology has been widely applied in variety of fields. In this paper, two kinds of VPN : IPSec and SSL VPN are studied in detailed, and the scope of application, security, scalability and other aspects are analyzed and compared, advantages and inadequacy are summarized, finally, VPN selection reference standard is proposed.
With the improvement and maturity of 3G network, the wireless communication rate for the users has become more and more high. Every research institution will focus gradually shift to long term evolution Version (LTE) of 3G network. In this paper, 3GPP LTE security mechanisms are introduced in detailed; the security architecture of LTE/SAE is present; the key structure and domain security of the network...
A new random number generate algorithm based on users' location information and spectrum information (ULSI) for cognitive radio networks is proposed in [1, 2].Through experiments analysis, the paper draws the conclusion that: random numbers generated from ULSI algorithm has good performance in statistical distribution. According the random numbers generated from ULSI algorithm, different types of...
Cognitive Radio Networks (CRNs) emerge as a possible solution for the lack of spectrum, and make different networks merge. However, security becomes the key problem need to be solved. Cognitive radio networks face not only traditional network security intrusion problems, but also unique security risks. In this paper, we investigate security issues in different classes which including spectrum security...
Rapid development of Wireless communication leads to more and more wireless standards appear, and security architecture of different standards are not compatible. In this paper, compatibility of security architecture for cognitive radio network is discussed and a unified security architecture is proposed. BAN logic analysis verifies the proposed architecture is adaptable, scalable, and suitable for...
Identity authentication is one of the key problems to be solved in cognitive radio networks. Current authentication mechanisms for cognitive radio networks are based on PPP Extensible Authentication Protocols. Future cognitive radio network can fusion current wireless standards. However, security requirements of various wireless standards are different which leads to current authentication mechanisms...
Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, a new authentication mechanism for cognitive radio networks is proposed which is based on third-party Certification Authority (CA). In...
Cognitive radio networks (CRN) is built on cognitive radio technology which could provide a good solution for heterogeneous networks merging. However, heterogeneous networks merging leads to security standards of the different networks are not compatible. This paper focuses on security architecture of different heterogeneous networks and proposes unified layered security architecture for the future...
Identity authentication is the key point for secure communications in cognitive radio networks (CRN). PPP Extensible Authentication Protocols are widely used in wireless networks recently. Cognitive radio networks are able to merge various wireless network standards whose security certification requirements are different. Therefore, current authentication mechanisms are not suitable for cognitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.