The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security in resource-limited environments poses a great challenge as the nodes comprising such a network are severely limited in processing power and storage. Various security protocols have been proposed for sensor networks and RFID that try to mitigate this problem but they provide security on a point-to-point basis which is weak and easily vulnerable to a number of attacks. In this paper, we discuss...
The high number of applications envisioned for VANETs and the diversity of their characteristics (time constraints, communication mode, etc.) form a challenge for the development of the adequate secure system. Clustering them into homogeneous groups can constitute a start point for the designing of the suitable communication and security components. In this work, we propose seven eSafety application...
Nowadays, there is an increasing demand for wireless and mobile networks that guarantee secure and reliable data communication among users. To enable data exchanges, authentication mechanisms need to be in place to dynamically verify the identity of communicating parties. Authentication is used as a base to deploy security mechanisms and exchange information. However, authentication is static and...
Network virtualization is a concept in which a Virtual Network Provider constructs logical virtual networks for various clients on a common, virtualized infrastructure substrate. However, there is currently no general framework or benchmark for assessing the security properties of these logical networks within the context of network virtualization. In this paper, we describe a virtual network security...
Cyber Physical Systems (CPS) is an emerging computing paradigm that is becoming prevalent in various technologies. Achieving a trustworthy CPS requires us to build mechanisms that ensure the integrity and authenticity of these systems. Fortunately with the new advancements in semi-conductor-based technologies, in particular Physical Unclonable Functions (PUFs), we have the potential to build secure...
Wireless Sensor Networks are increasingly being deployed in enterprise scenarios involving multiple actors. The capabilities of sensors must be shared across many applications and sensors must cooperate across federations spanning administrative domains. This paper describes our efforts towards constructing federated wireless sensor systems. It leverages and details key building blocks designed to...
This paper reviews the most important security properties found in computer systems in the context of the network infrastructure for public safety emergency response systems. The goal of this research has been to find what properties most affect the design of an emergency response network, together with the study of the set of the available solutions that can be used to implement these properties...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.