The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple's "goto fail" bug, and cryptographic weaknesses as illustrated by the Poodlebleed vulnerability, have brought the efficiency of the mostly self-regulated web security market into question. In this cross-disciplinary...
Information-centric networking (ICN) stands out as a promising solution to replace the Internet. In the ICN architecture, the content is the major element and the data name is used for routing the content, instead of the address location as in the Internet nowadays. Furthermore, it is desirable to cache as much data as possible near the user, aiming to improve performance and reduce data transfer...
Developers use their private keys to sign the apps before publishing in Google Play Store, an Official Android Market. These keys must be kept secret as they uniquely identify the authority of a developer. We conduct an investigation on more than 21000 real malware and 1000 benign apps in Google Play Store to justify whether the private keys of these benign apps have been manipulated by malware. As...
Android is the most popular mobile platform. Increased Android user base has attracted attackers to target the open platform and developed applications. Openness and flexibility of Android has introduced new attack surfaces and vulnerabilities that can be exploited. In this paper, we present Android vulnerabilities and also discuss the exploitation methods on the vulnerabilities and their effect across...
Cardinality in network flow data gives useful information for network administrators about suspicious communication on their network. Such communication tends to present abnormal number of source and/or destination network address. Our research group reported that cardinality presented in TCP/IP packet header can be used to detect malware propagation and P2P software usage in small size network. However...
Network tomography is an inference method for network internal characteristics from end-to-end measurements. In this paper, we study network tomography for estimating packet loss rates at nodes in wireless multihop networks with spatially dependent channels, where neighboring nodes tend to have packet loss rates of comparable magnitude. We propose a network tomography scheme based on graph Fourier...
Recent years have seen a great deal of research into Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, which will contribute to advances in driving support systems. In contrast to V2I communications, V2V communications offer the advantage of not requiring infrastructure, but introduction of such systems is not expected to be effective unless there is sufficient penetration...
Relaying is a widely proposed solution for multi-hop communication in PS environments. However, the selected relay is energy constrained and cannot go on indefinitely. Energy harvesting can solve this problem and make multi-hop D2D communication a viable solution for PS services. In this paper, selection of energy harvesting relay has been studied for device-to-device (D2D) communications. Public...
The focus of this paper is to present our solution in efficiently finding the trajectory of an information delivering UAV in a communication network to minimize delays, avoiding collision with a static or moving obstacle. The UAV can gather only limited information about the obstacle due to the limited sensing capability, so the estimates of the obstacle's size, speed and moving direction are used...
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) adopted in IEEE 802.11 WLAN suffers from serious problems of hidden terminal and exposed terminal. This will get worse if the environment becomes highly dense. The rise of channel interference among stations (STA) and the deterioration of the total network throughput as the result of these terminal problems need to be mitigated. A possible...
In this paper, we introduce a privacy preserving stream integration system. Nowadays, since wireless networks are available anywhere and costs of sensors have been decreased, many digital gadgets have sensors and we can collect sensor data easily. At the same time, many web based tools have been launched and we can easily make applications using such sensor data, i.e. data streams. In such Web of...
Controller Area Network (CAN) bus in the vehicles is a de facto standard for serial communication to provide an efficient, reliable and economical link between Electronic Control Units (ECU). However, CAN bus does not have enough security features to protect itself from inside or outside attacks. Intrusion Detection System (IDS) is one of the best ways to enhance the vehicle security level. Unlike...
Recently, cyber attacks become so sophisticated that conventional countermeasures that focus on preventing intrusion are becoming less effective. Thus, recent countermeasures are focusing on after intrusion such as an incident response. We previously proposed a system in order to support network administrators performing incident responses. However, our previous system uses only anomaly detection...
Content Delivery Networks (CDN) act as trusted overlay networks that offer high-performance delivery of common Web objects, static data and rich multimedia content by distributing content load among edge servers which are close to the clients. And the interconnection of different CDNs (called CDNi) could provide more advantages and benefits to both content provider and client than a single CDN during...
Most existing mobile ad hoc network (MANET) routing protocols use the minimum number of hops as a routing metric. These paths tend to contain long range links that may degrade both throughput and reliability. Higher throughput can be achieved by using short but effective links. The main problem with existing protocols is that they use only receiver signal strength indicator (RSSI) value to assess...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.