The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
In this paper, we introduce MVPN, a framework for building secure Virtual Private Networks (VPNs) with a novel Mobile IPv6 based Moving Target Defense strategy. Our approach aids in combating remote attacks against a VPN server. By eliminating the static address of the server, we make it difficult for an attacker to find the server. The server''s address is randomly changed at a certain interval creating...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
Device-to-Device (D2D) communication is one of the key technologies to get to very high data rates in future 5G networks through offloading part of the cellular traffic onto D2D networks. While extensive research is targeted on addressing the many challenges D2D brings along in cellular networks, security issues have not gained much attention, especially that the direct connections between proximity...
We investigate the physical layer security of synchronous multiple access transmissions using the Alamouti space-time block code in fading channels where multiple users communicate with a single intended receiver in the presence of an eavesdropper. We propose an artificial-noise-aided technique to secure the transmissions by having the Alamouti users collaborate with each other, without exchanging...
In this paper, we propose a new joint relay and jammer selection (JRJS) scheme to enhance the physical layer security for cooperative wireless networks with multiple intermediate nodes, where the decode-and-forward (DF) protocol is considered. In the proposed JRJS scheme, an ntermediate node is selected as the relay for data transmission, while the others are used to act as friendly jammers for disrupting...
Although using geolocation databases for spectrum sharing has many pragmatic advantages, it also raises potentially serious operational security (OPSEC) issues. OPSEC is especially a paramount consideration in the light of recent calls in the U.S. for spectrum sharing between federal government (including military) systems and non- government systems (e.g., cellular service providers). In this paper,...
In this paper, we propose an efficient, secure and privacy-preserving scheme for smart grid downlink communication. Specifically, we propose an efficient identity based signcryption scheme, called EIBSC, providing privacy preservation in downlink communication for smart grids. The proposed scheme is characterized by employing the concealing destination technique on a tree network topology to protect...
In this paper, weighted fractional Fourier transform (WFRFT) is employed to safeguard the physical layer (PHY) security of wireless communications. By leveraging the features of WFRFT, we propose a PHY security modulation scheme, which significantly degrades the equivalent signal-to-noise ratio (SNR) of the unauthorized receiver while imposing no impact on the legitimate receiver. With the proposed...
With the proliferation of mobile devices, spatial crowdsourcing is rising as a new paradigm that enables individuals to participate in tasks related to some locations in the physical world. Nevertheless, how to allocate these tasks to proper mobile users and improve communication efficiency are critical in spatial crowdsourcing. In this paper, we propose Fo-DSC, a fog-based deduplicated spatial crowdsourcing...
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel...
In this paper, we consider the multi-channel power optimization to enhance security for a full-duplex (FD) transmission pair. The FD-enabled concurrent transmissions between the users, on one hand, induce self-interference at their own receivers, and on the other hand, act as friendly jamming to degrade the eavesdropping for the other. To elaborate on such a tradeoff for secrecy maximization, we investigate...
We study the impact of assortativity or network mixing on interdependent security. We employ a population game model to capture the interaction among many agents when agents are strategic and have various security measures they can choose to defend themselves. We model the interdependence in security among agents using a dependence network. The overall (local) network security seen by agents is measured...
Security has become an increasingly important issue in wireless communications for the IoT (Internet of Things) environments, to which physical layer approaches can contribute by differentiating desired transceiver and wiretap channels for security of confidential data. In this paper, we propose an optimal power allocation strategy for practical physical-layer security, based on friendly jamming with...
With the increasing use of Wireless Sensor Networks, the privacy of the user is of main concern. The sensors maintain a layer 2 address that lasts for the node lifetime. As a consequence, an eavesdropper can easy trace the user and his activities, even in case the nodes send ciphered traffic.We propose a 6LoWPAN-ND extension to improve privacy and overcome the traceability of the user. With our method...
Software-Defined Networking (SDN) controllers are considered as Network Operating Systems (NOSs) and often viewed as a single point of failure. Detecting which SDN controller is managing a target network is a big step for an attacker to launch specific/effective attacks against it. In this paper, we demonstrate the feasibility of fingerpirinting SDN controllers. We propose techniques allowing an attacker...
Visible Light Communication (VLC) is a promising technique for high-speed, low-cost wireless services with the rapid development and wide deployment of Light-Emitting Diodes (LEDs). However, the broadcast nature of the VLC makes eavesdroppers easily intercept the light communication in various settings, e.g., offices, conference rooms and airport lobbies. Although previous work put forward physical...
With the rapid growth of the Internet, the current TCP/IP based network cannot well satisfy the requirements such as scalable content distribution, mobility, security and so on. The new networking architectures which aren't based on TCP/IP have been a trade of next generation networking such as Information-Centric Networking (ICN). In smart grid, parts of communication protocol in IEC 61850 are also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.