The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the requirements of mobility, flexibility, and rapid response, public safety Mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. This special field communication brings new security challenges. In this paper, we propose a key agreement scheme with voting receiver...
In an open distributed environment, protection of sensitive files and data becomes more difficult. Traditional access control mechanisms are not suitable for such dynamic environment. Trust can be an effective approach to solve the access control problem. In this paper, by considering fuzziness and uncertainty of trust, we propose a trust quantification algorithm based on grey fuzzy comprehensive...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
Authentication is a basic mechanism for secure roaming in wireless mesh networks (WMNs). However, existing roaming authentication protocols such as 3G, IEEE 802.1x, etc. cannot meet the requirement for secure and fast network access in response to rapid increase in the size of networks and in the number of users. In this paper, we propose an instant authentication scheme for secure roaming in WMNs...
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs) in wireless applications. Current approaches rely mostly on the use of privacy policies to describe and solve this problem in an ad hoc way. In this paper, we propose a method based on the three-dimensional access control model to support privacy requirements. We show...
Privacy is one of the most important issues in providing high-quality ubiquitous network services to users over the Internet. Although several privacy aware access control models have been proposed in recent years, these models still rely mostly on the traditional access control models designed primarily for security. When privacy becomes a main concern, these models are no longer adequate. In this...
A wireless mesh network (WMN) is a new wireless network technology and there is a trend to adopt the technology to build commercial mobile ad hoc networks. Since a WMN is such a network without fixed infrastructure and is operated in an open medium, any user within the range covered by radio wave may access the network. Therefore, a critical requirement for the security in WMN is the authentication...
The wide deployment of Web services in wire line and wireless networks has resulted in the proliferation of user identities relying on which the trust between a user and a Web service can be established through identification and authentication. Since user identities normally contain some information concerned with user privacy, sharing of such identity information between Web services should be minimized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.