The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolution of Internet and its hosts does not match anymore the current Internet architecture, designed when mobility, multihoming and security were not considered, and based on IP addresses with the double role of host's identity and host's topological location. In this paper we propose a secure global and localized mobility management scheme suitable for multihomed Mobile Nodes (MNs) and based...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping...
Covert timing channels exploit varying packet rates between synchronized sending and receiving hosts to transmit hidden information. The overhead in synchronizing covert timing channels and their inherent dependence on network conditions are their main drawbacks. In this paper, we propose a covert channel using multiple active connections that does not depend on the timing differences between consecutive...
In this paper, we study the rekeying issue in IEEE 802.16e WiMAX networks. The existing rekeying scheme the Multicast and Broadcast Rekeying Algorithm (MBRA) unicasts new keys to each subscriber station (SS). This scheme does not scale well since it incurs large communication overhead when the number of SSs increase. In our work, first we propose a general tree-based rekeying scheme, which is more...
Wireless vehicular communications possess significant challenges for their massive deployment in next generation vehicular networks. Some important issues that must be tackled deal with security, billing and scalability in order to provide reliable services in the case of non-safety applications. In this paper we study a service provisioning protocol intended for Vehicular-to-Infrastructure (V2I)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.