The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When we consider the online service or desktop application there is major issue of security breaching. Old password schemes has some drawbacks like hacking of password, shoulder-surfing attack as far as password is concern, online password guessing attack, relay attack. Hence there must be system that provides good solution for such password cracking attacks. There are many solutions for it and various...
Currently there are several cloud systems which provide storage as a service which are PaaS systems. They provide access to their services via web services. In this research, we pro-posed a unification framework that integrates different IaaS cloud layers in order to collaborate storage space of two or more storage clouds. We build a virtual storage area network (VSAN) by distributing files to all...
Data preserve on cloud has several issues of security if it is very sensitive. Also user privacy is also important when he transact with the sensitive cloud data. While storing data on semi-trusted cloud user has to take care of attacks like replay attacks, unauthorized data access etc. User now prefers to keep data on cloud by considering it is safe and untouched by other users. Hence proposed system...
Smart nodes that sense the environment and communicate wirelessly to reach a sink node create wireless sensor networks. One of the main research challenges regarding wireless sensor networks is user deployment, namely in terms of configuration and management. On non-commercial solutions the user typically must be aware of the underlying technology to obtain sensing services. Internet connectivity...
Body Area Sensor can enable healthcare monitoring in an unobtrusive way. Medical and healthcare research has been striving to find relationships between core body temperature at female genitals and certain health conditions, such as ovulation period. This paper presents a solution for intra-body temperature monitoring based on a new intra-body sensor, communication and desktop application tool. This...
Mobile learning (m-learning) is a technology with a huge potential to be used in distance learning. This technology is developed for mobile devices. This paper describes the proposal of a location aware m-learning system for personal digital assistants (PDA) with global positioning system (GPS) receivers incorporated. Location-aware support is provided using GPS. This application was designed and...
Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. Deploying WSNs in unattended environments can cause various security threats. In these scenarios, provisioning user authentication is a critical issue. In this paper, we propose improved robust user authentication scheme for WSNs, which is a variation of strong-password based solution. We have analyzed security...
With the growth of the Internet services, voice over IP (VoIP) has been playing a key role in cutting the costs of telephone calls. It can be seen that since the demand of VoIP over wireless network is growing, the use of VoIP over mobile ad-hoc network (MANET) is expected to grow as well. We have identified some of the challenging issues to ensure robust and secure voice communication over MANET...
Wireless sensor networks greatly benefit from simulation before deployment, since some of these networks may contain thousands of nodes. The new challenges compared to traditional computer networks led to several approaches for network simulation, namely SENSE - Sensor Network Emulator and Simulator. However this approach presents a limited user interface, namely based on text, forcing users to have...
Radio frequency identification (RFID) and biometric technologies are promising technologies and are already widely used in applications such as building access controls. User authentication is an important mechanism for preventing unauthorized access. Even though we can use different user authentication mechanisms, using single kind of user authentication mechanism may not provide perfect reliable...
Optical burst switching (OBS) was proposed as an alternative optical switching paradigm, in order to overcome the limitations of optical circuit and optical packet switching paradigms. In OBS networks, resource reservation protocol plays a key role for better resource allocation along the path from source to destination data transmission. In this paper, we focus and consider some of the relevant one-way...
Mobile ad-hoc network (MANET) is an appealing technology that has attracted lots of research efforts. Due to frequent communication failures, multipath routing is preferred than single-path routing in many applications such as multimedia streaming over MANET as the former can provide robustness, load balancing and reduce end-to-end delay. However, a security remains important factor that hinders the...
Among the research community, on-going efforts are being continued to efficiently interconnect MANETs to fixed infrastructure in order to expand the reach of the Internet to Wireless access networks. Such scenario gives raise to a number of challenges that require solutions involving Internet gateway selection scheme, extensions to ad hoc routing technique. In this paper, we depict a network architecture...
With the growth of the Internet services, Voice over IP (VoIP) has been playing a key role in cutting the costs of telephone calls. It can be seen that since demand of VoIP over wireless network is growing, use of VoIP over Mobile Ad Hoc Network (MANET) is expected to grow as well. We have identified many challenging issues to ensure robust and secure voice communication over MANET. In this paper,...
With growth of Internet and wireless IP network, multimedia systems can be accessed from any-where and anytime. However, efficient real-time services are open and challenging research problem. To implement real-time services such as VoIP over wireless access network, IP header compression scheme can be used for saving bandwidth. Enhanced compressed RTP (ECRTP) has been used for lossy link and high...
With the increasing demand of ubiquitous computing, the interconnection of mobile ad hoc networks (MANETs) to Internet is also getting attractive, which is so-called hybrid or connected MANET. In MANET paradigm, routing is a challenging task due to mobility and the resulting inherent dynamic network topology. In many applications, multipath routing scheme is favorable than single-path routing due...
A wireless multihop ad hoc network is emerging as an important area for new developments in the ubiquitous network. Although ad hoc network is attractive solution, there are still some challenges in robustness and security issues. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is complete solution for end-to-end security for multpath wireless...
In recent years, with ubiquitous computing, the interconnection of MANET to Internet is getting more attention. Further, as use of multipath ad hoc routing protocols is favorable in many application, hybrid multipath MANET, which is a MANET with multiple routes to the Internet, will also grow. Security issues in hybrid MANET, however, is still challenging task. This paper addresses security issues...
Mobile ad hoc networks (MANETs) are collections of autonomous mobile nodes with links that are made or broken in an arbitrary way. Due to frequent node and link failures, multipath MANET is preferred than single-path MANET in many applications. Multipath routing schemes are used for achieving various goals such as robustness, reliability, and load balancing. However, before they can be successfully...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.