The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication...
The server cluster technology become more and more prevalent in the enterprise level applications, failure detection is one of the key technologies which can ensure the server cluster continue providing services. This paper introduced several types of the server cluster failure, and its design objects; we then analyzed the existed detection mechanisms, and get rid of the traditional detection enhancement...
In order to enhance the utilization rate of the existing magnetic resonance imaging (MRI) experiment instruments and to allocate the existing experimental resources fully and reasonably, we constructed the experiment framework with remote experiment ability for MRI imaging technology by means of the desktop magnetic resonance imaging apparatus which are developed by Shanghai Niumag Cooperation. This...
Service interface description is one of the most important problems in services-oriented software architecture, and formal description methods are considered to be a promising approach for service interface. Presently the typical Web service description language (WSDL) only provided the syntax level information that needed by the service interaction without containing the dynamic behavioral protocol...
Electronic voting systems, catering to different requirements, have been widely implemented and used. This paper will overview the concerns to secure electronic voting and tries to give a solution. A simple scheme is designed to show that technical problems as eligibility and privacy can be solved fairly easily.
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
The communications are interrupted by the hidden terminals in the traditional MAC protocols when the nodes?? power is asymmetric in WSN networks. On the basis of S-MAC the improved protocol is proposed. Node judges whether the power asymmetric nodes are occurred in the vicinity of it according to the link state with neighborhood nodes. Then neighborhood nodes broadcast bandwidth reservation (BRES)...
Wireless sensor networks (WSNs) consists of unattended sensors with limited storage, energy (battery power) and computation and communication capabilities. Since battery power is the most crucial resource for sensor nodes, the utility of energy efficient and the maximum lifetime is special important. In this paper, we present an energy-efficient dynamic clustering algorithm(EE-DCA)for wireless sensor...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
The Chord protocol is the best known example of implementation of logarithmic complexity routing for structured peer-to-peer networks. Its routing algorithm, however, does not provide an optimal trade-off between the size of the finger table and the average number of hops to reach destination. Lately, a base-k chord appeared based on the original Chord, the routing perfomence of this system improved...
A number of logics have been proposed to analyze the cryptographic protocols, but most of them cannot explicitly express time factor which plays an important role in protocols. In this paper, we present a logic to model the time in cryptographic protocols. Our logic is based on the predicate modal logic, so, the time factor can be expressed by invoking a time variable as a parameter of predicate and...
In this paper we present a uniform negotiation and delivery framework for TCP-based data collaboration applications over IP network. With this framework rich innovative collaboration services can be developed conveniently and provide users with novel communication experience. The framework adopts the offer/answer model with extended Session Description Protocol as session description and negotiation...
Wearable computers need networking by using wireless ad hoc network in order to utilize them more effectively, routing protocol becomes an important research field for its significance in wireless ad hoc network. In Ad Hoc network, there are mainly two kinds of routing protocols: proactive routing protocol and on-demand routing protocol, to evaluate the performance of two kinds of protocols, we choose...
Restricted Floating Sensor (RFS) proposed by Yunhao Liu is an important model in offshore data collection. There is a need for highly precise, real-time in many offshore monitoring. In this paper, we propose a Transmission Control (TC) strategy for RFS networks. This strategy can modify the transmission delay adaptively depending on users together with the changeful condition of wireless links. The...
The terminal design of a data acquisition system based on GPRS is designed in this paper. It works out the hardware design of GPRS terminal equipment, including the minimum system design based on the Samsung ARM7-core microcontroller S3C44B0X, and the hardware design adding the GPRS engine MC35i produced by Siemens and RS485 interface to the minimum system. According to dial-up procedure, describes...
Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel protocol by cooperation between two kinds of agents -Task Agent and ACK Agent. Task Agent moves freely in the net to complete some task...
NS2 is an object-oriented simulation tool to simulate and analyze network elements; it is also a powerful tool to develop new protocol and scheme. In the paper, we analyze the features and models of wireless network in details; discuss the simulation process and implementation of wireless network on the basis of NS2. Also, AODV protocol and self-defined MFlood protocol in wireless network are simulated...
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.