The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An RFID system generally consists of tags, readers, and backend servers with the readers charged with authenticating/identifying the tags with the help of the servers. Two important enhancements have been suggested for widespread adoption of RFIDs, namely the use of low cost (5?? or less) passive RFID tags and serverless system design to overcome the need for persistent connection between the readers...
In large scale disaster management operations with hundreds and thousands of victims, fast access to distributed heterogeneous information of different organizations is required for efficient and reliable dispensation of rescue operations. The development of such emergency systems poses a big challenge, if requirements such as performance, security and reliability have to be fulfilled simultaneously...
Plug-in electric vehicles (PEVs) will not only have a substantial influence on the emerging smart grid system but also create numerous challenges for the utility and customer to deal with their connections and charging. Authentication and authorization processes are critical elements to enable mass deployment of charging stations and to provide authorized customers to access the charging facility...
Continuous authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints...
Many applications in wireless sensor networks (WSNs) demand security. The standart low-power wireless sensors (TmoteSky, MICA2) have severe resource constraints. Despite some work on the adaptation of public-key cryptography to the resource constrained sensors, it is still not obvious whether the resources on the sensors are sufficient for the current asymmetric algorithms run in decent time and space...
Security is an important issue in mobile ad hoc networks (MANETs). However, security schemes have significant impacts on throughput. That is because 1) they need some overhead and consume some network resources, thus decrease throughput consequently, 2) most previous works consider security and throughput separately in designing a MANET, which can not achieve an overall optimization of network performance...
A Key Establishment Protocol for Anonymous Wireless Roaming (KEP-AWR) allows a wireless user such as a Wi-Fi/WiMAX enabled laptop or smartphone to establish a session key with a foreign server and also roam from one foreign network to another in an anonymous way such that besides the involving foreign server and the user's home server, no one can find out who the user is. Most existing KEP-AWR protocols...
Wireless access points largely fall into three categories: home and small business networks, enterprise networks, and hotspots. Wi-Fi Protected Access (WPA) provides solutions to home, small business, and enterprise networks, but hotspots typically are not secured at the Medium Access Control (MAC) layer because they are open to the public. In this paper, we present a scheme that establishes a secure...
In this paper, we proposed an integrated biometric-based security framework for wireless body area networks, which takes advantage of biometric features shared by body sensors deployed at different positions of a person's body. The data communications among these sensors are secured via the proposed authentication and selective encryption schemes that only require low computational power and less...
In a multi-network environment, users can receive services via several networks, protocols, and connected devices. These services are usually bound to their specific technology and often limited to a dedicated service provider domain. We are developing a platform overcoming these limitations by enabling information sharing beyond the boundaries of network technologies and services. In this paper,...
The emerging vehicular communications will enable a variety of applications for safety, traffic efficiency, driver assistance and infotainment. Due to high vehicular speed, sporadic connection, limited communication range, and large volume of data that need to be transmitted, vehicular communications have the crucial requirements of fast authentication and encryption/decryption. This paper addresses...
Providing strong security is necessary for any wireless access networks. The latest broadband access network implementations are based on WiMAX and LTE, since they support high data rate and mobility. The WiMAX network has well structured QoS mechanisms and security architecture to support all kinds of fixed, mobile and multihop network users. Even though the existing fixed WiMAX network has well...
Wireless body sensor networks (BSN) are being used to continuously monitor the patient's conditions and recovery progress. It is very important to secure the confidentiality, integrity and authenticity of the patient's health record in such applications. In this paper, we propose a novel key distribution and management scheme that uses keychains to establish group keys for body sensor networks. This...
Mobile multi-hop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates and relatively low cost. However, security of MMR WiMAX networks is the main challenge. In this paper, we first identify a possible attack on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can...
Traditional authentication techniques for wireless communications are facing various challenges due to the unique radio propagation environment. A new continuous physical layer authentication technique with time-varying transmission parameters is investigated to enhance the security of orthogonal frequency division multiplexing (OFDM) based wireless communications. A precoded cyclic prefix (PCP) is...
Vehicular ad hoc networks have attracted a lot of attention in recent years, in either vehicle-to-vehicle or vehicle-to-infrastructure scenarios. In this paper, we focus on the latter, particularly for vehicles to upload to roadside units, the so-called drive-thru Internet, in a secure and efficient manner. Due to the ad hoc nature and wireless communications, traditional certificate-based security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.