The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicular ad hoc network (VANET) is a part of the intelligent transportation system (ITS) that provides safety and nonsafety applications. The high mobility of vehicles and the wireless communication environment in VANET makes it vulnerable to various attacks. One among them is the Sybil attack, where a Sybil attacker creates multiple fake identities called Sybil nodes that disrupt the functionality...
Rapid advances in the technologies of wireless communication have led to the evolution and empowerment of Wireless Body Area Network (WBAN). The health care applications are improved by using WBAN with the usage of different variety of sensors for monitoring the patient in order to diagnose any life threatening diseases. In recent past, several experts have concentrated in building system architecture...
Life has become speedy in current scenario and vehicles play a vital role in this never ending race. Smart vehicles equipped with latest gadgets are becoming a part of intelligent transportation system (ITS) and point of attraction among drivers. Vehicular ad hoc networks (VANETs) is the environment of such smart vehicles that makes traffic functionality smooth and develops a path of infotainment...
Twitter is one of the most popular Online Social Networks (OSN). It is used by millions of users worldwide everyday. Due to the text limitation on Twitter (140 characters per tweet), URL (Uniform Resource Locator) shortening services are widely used, however they are not free from risks. Shortened URLs are completely different from the original URLs, and hence users have no idea where the short URLs...
Security agencies across the world are facing major challenge from the left-wing extremism and terrorism. Terrorists plan to create liberated zones by forming guerrilla squads. They plant IEDs to stop movement of security forces. Forces due to the inadequacy of traditional tools and techniques, unfamiliar terrain, lack of knowledge of local language are struggling hard to get an upper hand over the...
Terrain based situational awareness is carried out by armies for positioning of military combat units. Situational awareness can be assessed in various ways, but a weight-based analysis using thematic layers and other terrain inputs is a unique approach. An application using satellite imagery, to assess quantitatively the covering terrain, with focus on mountainous combat zones for positioning of...
Mobile Ad Hoc Networks are those which could be rapidly deployed anywhere without any infrastructural facilities. The topology will be very much dynamic and the entry and exit of nodes will be unpredictable. This makes the MANET more vulnerable to attacks. Security becomes more threatening due to the insecure admission of the nodes to the network. Variety of security protocols which successfully provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.