The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine-to-machine communications is characterized by involving a large number of intelligent machines sharing information and making collaborative decisions without direct human intervention. Due to its potential to support a large number of ubiquitous characteristics and achieving better cost efficiency, M2M communications has quickly become a market-changing force for a wide variety of real-time...
In order to protect the privacy and the security of the tag, we propose a mutual authentication protocol for low-cost RFID system. The protocol ensures that the reader (or server) and the tag authenticate each other, provides the privacy and security properties for low-cost RFID system and also has good performance. The protocol resists almost all attacks except cloning attack, and achieves backward...
Privacy preserving in location-based service (LBS) has been an important issue in Vehicular Ad hoc Network (VANET). Traditional k-anonymity algorithm dealing with location privacy protecting problem does not consider vehicle's mobility and inner collaborator. In this paper, we propose a new algorithm which uses dynamic and mobile aware anonymous peer selecting algorithm to improve the anonymity and...
The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, some users can calculate the keys along the path from their own point to root by themselves, and during a departure procedure, one user is selected...
For TCP/IP Agreement has certain security bugs, the hacker catches the opportunity to attack the Network. On the basis of the analysis of the TCP/IP Agreement's vulnerability, the article has further analyzed the vulnerability of the Transport Layer Agreement, and discussed the security and the promotion method of TCP/IP Agreement's transport layer.
To achieve secure communication between sensor nodes in wireless sensor networks (WSNs), it is important to be able to establish efficient key predistribution mechanisms. Here, a matrix-based key predistribution scheme for WSN is presented, as shown in the following process. First, LU matrix-based method is employed to decompose the polynomial pool, which substitutes for the key pool to establish...
Certificate status verification is one of the most important parts in WPKI. Aimed at dealing with the problems of certificate status verification in the wireless environment, the paper puts forward a new method - OCSP of cache-based server agent OCSP request, which takes full use of the advantages of the current OCSP certificate status verification scheme, and can get the real-time status of the certificate...
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs) in wireless applications. Current approaches rely mostly on the use of privacy policies to describe and solve this problem in an ad hoc way. In this paper, we propose a method based on the three-dimensional access control model to support privacy requirements. We show...
A defense system against UDP flooding attack with artificial immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity of IP address. Eigenvalue matching was introduced based on analyzing the r-continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black...
In this paper, we introduce an m-commerce security architecture; discuss how the communication takes place between user, mobile station (MS) and access point (AP). We use an new authenticated mechanism between user and MS. And we add Access Point in wireless net in order to avoid being attack and eavesdropping message. We analyze the characters of the architecture with the Summary of Mobile E-commerce...
Security is becoming an increasingly important QoS parameter for which network providers should provision. We focus on monitoring and detecting one type of network event, which is important for a number of security applications such as DDoS attack mitigation and worm detection, called distributed global icebergs. While previous work has concentrated on measuring local heavy-hitters using ldquosketchesrdquo...
MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) has been proposed to address the naming and addressing challenges for NGI (next generation Internet), we present several design enhancements for MILSA which include a hybrid architectural design that combines "core-edge separation approach" and "split approach", a security-enabled and logically oriented...
Eigenvalue matching was introduced based on analyzing the continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black hole" detection. A defense system against SYN Flooding attack with immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity...
Voice over Internet Protocol (VoIP) service has been a very popular and important application over the Internet. Recently, wireless mesh networks (WMNs) has been considered as a good solution for VoIP services due to low cost and convenience, easy deployment and larger area coverage. However, many relevant security issues have been raised for integrating IP Telephony into the existent applications...
Anycast is a communication mode in which the same address is assigned to a group of servers and a request sent for a service is routed to the 'best" server. Because the group management and the routing protocol in the anycast are not so mature, there are distinct and significant security vulnerabilities in both the anycast model including denial of service, theft of service, eavesdropping, and...
Recently, home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. This paper designs a ubiquitous computing based smart home safety management (U-SHM) for digital life. The proposed scheme integrates RFID and context awareness technologies in ubiquitous environments to increase the efficiency of mobile commerce and improve the life...
With the fast development of network technology, computer technology, digitized information technology and image processing technology, some online score systems based on the network are developed in recent years. However, they only can be used in the local area network. Thus, a new online score system is designed and implemented to able to be used in the Internet. The structures of this system are...
The next generation of wireless networks, as envisioned by recent advances in cognitive radio (CR) technologies, will be intelligently adjust their configuration to changes in the communication environment. Reconfigurability is set to be an important facet in the evolving world of mobile and wireless communications, through which technologies such as cognitive radio are greatly facilitated. In next...
Several methods have been proposed to support location-based services without revealing mobile users' privacy information. There are two types of privacy concerns in location-based services: location privacy and query privacy. Existing work, based on location k-anonymity, mainly focused on location privacy and are insufficient to protect query privacy. In particular, due to lack of semantics, location...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.