The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many access control models have been proposed in the literature, and they have been extensively studied under the acronyms of DAC, MAC, RBAC, ABAC, etc. Each of these models has been studied in isolation, but some real-life situations need elements of several of them, in order to properly express data protection needs of complex organizations. A formal framework is presented, that allows not only...
In future Internet architectures, Virtual Network Providers (VNP) must be able to compose virtual networks in a way that balances security with other priorities as expressed by Service Providers (SP). In this paper, we outline a framework in which a VNP can assess the security and assurance (robustness) properties of virtual networks and use these to help select an SP-appropriate topology. The topology...
Malicious and selfish behaviors represent a serious threat against routing in Delay or Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN represents a great challenge. In this paper, we propose PMDS, a probabilistic misbehavior detection scheme, for secure DTN routing. The basic idea of PMDS is introducing a periodically...
As the world becomes an interconnected network in which objects and humans interact, new challenges and threats appear. In this interconnected world, smart objects seam to have an important role in giving users the chance for life-logging in smart environments. However, the limitation of smart devices with regard to memory, resources and computation power, hinder the opportunity to apply well-established...
Internet of Things devices being used now expose limitations that prevent their proper use in healthcare systems. Interoperability and security are especially impacted by such limitations. In this paper, we discuss today's issues, including benefits and difficulties, as well as approaches to circumvent the problems of employing and integrating Internet of Things devices in healthcare systems. We present...
For the sake of better scalability and flexibility in the mobile and multihoming environments, future networks are expected to be based on the concept of ID/locator split. The ID/locator split architectures require storing, updating and retrieving of ID/locator mappings frequently, for which they need built-in security. To address this issue, this paper presents an integrated security scheme for securely...
Due to the extensive use of wireless technologies, security is one of the most important and challenging issues in smart grid networks. To secure data communications, strong authentication and key management mechanisms are needed. In this paper, we propose a mutual authentication scheme and key management protocol tailored for Home Area Network (HAN) with low overhead and enhanced robustness. Using...
Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically be awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime...
Digital forensic investigators are facing challenging problems of finding clues and solving crimes involving digital data. Advanced metering devices (smart meters) are being installed throughout electric networks in Europe and in the United States. The high-resolution energy consumption data which are transmitted by some smart meters to the utility company allow identification and monitoring of equipment...
In this paper, we consider smart grid system demands on remote controlling a smart appliance from up to the central controller layer, in a confidential fashion and immune from any in-between principles' intrusion. For instance, we need to remotely turn off a low-priority high-demand appliance in case of crisis and emergency, or manage a plug-in electric vehicles recharging. Hence a Home Area Network...
This paper is concerned with improving location-privacy for users accessing location-based services in opportunistic DTNs. We design a protocol that offers location privacy through request/reply location obfuscation technique that uses the nodes' own social network to drive the forwarding heuristic. We propose a fully distributed social-based location privacy protocol (SLPD) that utilizes social ties...
Trust and reputation management in peer-to-peer (P2P) networks is a current topic. Most of the works focus on unstructured networks. The existing work operating in structured networks concentrates on a “clean routing table” and aims to keep malicious nodes from it. We follow a different approach which we call “clean routing process”: There are no restrictions regarding the nodes that may be contained...
Malware targeting broadband devices like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, we provide a formal description of modem malware life cycle. Furthermore, we propose a set of techniques to perform detailed analysis of infected modem and we provide the binary samples of modem malware at our web repository. Description of the modem malware evolution...
Mobile users expect quick and secured handovers to achieve seamless service connection. However, long delay due to the time-consuming authentication procedure is a well-known bottleneck of the mobile WiMAX handover schemes. In this paper, a pre-authentication based handover scheme using symmetric key cryptography is proposed to facilitate fast and secure handovers for mobile WiMAX networks. The scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.