The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile IPv6 supports a global mobility solution in wireless networks. The mobile node is unable to send or receive packets during handover, due to link switching delay and IP protocol operations. This handover latency is caused by standard mobile IPv6 procedures, such as movement detection, new care of address configuration, and binding update. This configuration is the most time-consuming phase,...
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary symbols and defined as words. The frequencies of word appearance and word to word transitions are used to build a model of normal behavior. A simple anomaly score calculation is designed for fast attack detection. The method was tested using real traffic and recent attacks to demonstrate that it can be...
Current routing protocols in WSNs or even in wireless Ad hoc networks are very susceptible to many attack i.e. stealthy attack. The most simple among those is where the adversary injects malicious routing information into the network. This results in routing inconsistencies leading to high increase in end-to-end delays or even packet losses in the network. In our paper, first, we abstract two fundamental...
This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i,...
The aim of this paper is to provide a better understanding on the role of interoperability in eGovernment applications. The focus of interest is on eGovernment applications involving more than one agency or heterogeneous technical infrastructures. The main research objective is to reveal contemporary, interoperability-related, obstacles and implementation decisions and trends in eGovernment applications...
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on NetFlow which analyse the source data from...
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate...
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university community with secure and interoperable services.
The aim of this work is to develop a simultaneous multi user access system - READ (Remote ASIC Design and Test) that allows users to perform test and measurements remotely via clients running on mobile devices as well as on standard PCs. The system also facilitates the remote design of circuits with the PAC-Designer. The system is controlled by LabVIEW and was implemented using a Data Acquisition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.