The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays security issues are growing in a tremendous rate. So it is expedient to have a mechanism to keep track of its security issues in the network or host. The Intrusion Detection System (IDS) has a critical part for supervising the networks. The false alarm rate and accuracy are the two important factors to be considered in the design of competent IDS. The role of classification algorithms is...
An enhancement of the authentication protocol for Otway-Rees protocol is proposed to improve some drawbacks of original Otway-Rees protocol and Improved Otway-Rees protocol. In context, a problem is in original Otway-Rees protocol suffer from lack of data integrity and data confidentiality invites impersonation attack by modifying message format sequence and adding other messages. The Improved Otway-Rees...
The concern for security increases due to the advances in the falsification technology. Biometrics is the only authentication method which truly identifies an individual when compared to other methods like PINs and passwords. Even though there are numerous biometric approaches, these are not robust. In this paper, we aimed at building a protocol which focuses on Electrocardiogram (ECG) being used...
Today's network is distributed and heterogeneous in nature and has numerous applications which affect day to day life, such as e-Banking, e-Booking of tickets, on line shopping etc. Hence the security of the network is crucial. Threats in the network can be due to intrusions. Such threats can be observed and handled using Intrusion Detection System. The security can be achieved using intrusion detection...
Security is one of the basic needs of a system. New methods of providing security need to be found. To overcome all the security issues in current protocol, a new protocol is defined. The protocol makes use of visual cryptography technique by which images can be used as password. Here, we use the visual secret sharing scheme to protect the data that cannot afford getting hacked. Authentication is...
Intrusion detection system plays an important role in network security. Intrusion detection model is a predictive model used to predict the network data traffic as normal or intrusion. Machine Learning algorithms are used to build accurate models for clustering, classification and prediction. In this paper classification and predictive models for intrusion detection are built by using machine learning...
PKI (Public Key Infrastructure) based AKA (Authentication and Key Agreement) scheme known as Optimizing PKI for 3GPP Authentication and Key Agreement(OPAKA) has been proposed in the field of 3G wireless mobile communication system. The study of OPAKA revealed the drawback of protocol and an Enhanced version of OPAKA namely EPMOS (Enhancing PKI for Mobile Commerce Security) is proposed. The recent...
Unified Modeling Language(UML) is a standard language for modeling in the domain of Object Oriented Software Development. However, it lacks the modeling construct for real time systems. The UML profile for Modeling and Analysis of Real Time Embedded Systems (MARTE) has been recently standardized by Object Management Group (OMG) to provide the necessary constructs. It provides support for Model Driven...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.