The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduced Authentication trends on IEEE 802.15 Task Group 8 which aims to develop a Standard for wireless Medium Access Control (MAC) and Physical Layer (PHY) specification for Peer Aware Communication (PAC). PAC terminals which have only low power and low computational power can make a network without infrastructure using ad-hoc searching. Because of no infrastructure, there are...
ICSs are typically used in Ethiopia in industries such as electric, water, sugar factories and different discrete types of manufacturing industries. These control a system which includes supervisory control and data acquisition (SCADA) systems, and distributed control systems (DCS) are critical to the operation of Ethiopian critical infrastructures that are becoming highly interconnected and mutually...
This paper introduces a multi-factors security key generation mechanism for self-organising Internet of Things (IoT) network and nodes. The mechanism enables users to generate unique set of security keys to enhance IoT security while meeting various business needs. The multi-factor security keys presents an additional security layer to existing security standards and practices currently being adopted...
Software Defined Networking (SDN) constitutes a fundamental technological solution which responds to the most essential challenges in 5G and beyond networks. Security still remains one of its most controversial issues. Security should be ensured in order to create reliable and consistent networks and on line applications and satisfy the demands of Service Level Agreements (SLAs). Therefore, teaching...
Existing authentication protocols for Big Data system such as Apache Hadoop is based on Kerberos. In the Kerberos protocol, there are numerous security issues that have remained unsolved; replay attacks, DDoS and single point of failure are some examples. These indicate potential security vulnerabilities and Big Data risks in using Hadoop. This paper presents drawbacks of Kerberos implementations...
Cloud computing is a relatively emerging concept of providing dramatically scalable and virtualized IT resources. The lack of novel security controls for the cloud might arise from the fact that cloud computing is the convergence of many different technological areas, including virtualization and service oriented architectures. One of the most challenging issues in clouds is to provide an appropriate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.