The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of IoT(Internet of Things), the combination of ICT(Information and Communications Technologies) is active in devices and systems on off-line and the Hyper Connectivity Age is becoming. This provides convenience and usefulness to users, at the same time provides threats of IT security issue to users. It is possible to utilize the cryptographic module in order to solve the security...
Recent malicious attempts in Cyber-space are intended to emerge cyberwar such as stuxnet as well as to get financial benefits by spam, distributed-of-service(DDoS), identity theft, and phishing through a large pool of comprised hosts, which are called zombies. Botnets are becoming one of the most serious threats to Internet security. We consider that major pre-symptoms of cyber threats are activity...
As wireless network cannot dispense with a proper security measure due to its inborn vulnerability, a new security measure has been developed with an advent of new wireless network technology. Each security measure properly serves the security needs of its associated wireless network as it was intended to. Quality of Protection (QoP) estimates the stability of individual network system by quantifying...
A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms,...
Many researches about Binding between Mobile IPv6 techniques and Wireless MAC are ongoing. But, Studies related to security hardly ever are conducted. In paper last time, we proposed Optimized Cryptographic Binding Protocol (OCBP)[2]. OCBP that bind between IEEE 802.16e Security Protocol (PKMv2 EAP method) [1] and MIPv6 AAA bootstrapping authentication procedure [15][17] supports more efficient authentication/Key...
Nowadays the more wireless mobile communication technology has been improved, the more wireless users has been increased. On the other hand, cyber crime in WLAN has been gradually increasing. To solve the cyber crime in wireless environment, WLAN forensic is not only counterproposal but also resolution of the cyber crime in WLAN. In this paper, we propose the evidence collection of Denial of Service...
In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.