The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures are the usage of a temporary key, TK, the...
A vehicular network must ensure a trust relationship among participating “smart vehicles” (vehicles installed with wireless network devices) and roadside infrastructure in order to maximize the benefit provided by the network. In this paper, we present practical ways to provide reliable reputation scores for vehicles in a vehicular network. Because in most of the time, the majority of people drive...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access banking services on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances,...
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks,...
Internet now a day, is one of the most popular mode of communications, and its popularity suffers from a vital issue of not supporting the security of the confidential data during transmission. In this work, a high-speed cryptosystem for image data has been developed for efficient and secured communication over Internet. The basic idea is that the given image is first compressed by VQ for traffic...
The Internet traffic is increasing day by day. Also, secure data communication is the need of the hour. But the standard compression techniques which are in use, are independent and do not consider the security issues. Hence, we present a general encoding technique for secure data communication over a language L with a finite alphabet set ??. The encoded message is a bi-tuple of which, the first is...
It introduced virtual private network (VPN) technology and its classification in network security protection system. The advantages of VPN technology in establishing security protection system were analyzed. Four kinds of key technology of VPN including tunneling, encryption & decryption, key management and authentication were presented. Taking electric power data network and load management system...
The rapid consumer adoption of high-speed Internet connections has lead to the unprecedented interconnection of home networks. Consequently, the number of domestic home automation networks offering Internet connectivity has increased. These home automation networks are increasingly comprised of resource limited wireless sensor networks (WSN). This creates the potential for malicious users from across...
With the development of the Internet, Multicast applications are deployed for mainstream use, IP multicasting is critical technology in those applications. The absence of security mechanism has limited the use of multicast. In order to protect communication confidentiality, Traffic in secure multicast is encrypted with a Session Encryption Key which is only to the certificated group members. Key management...
TCOMS (the telecom comprehensive operations management system) is one of the support systems in operation and production of telecom-company, which not only covers wide area, but also has a complex construction and Internet connection. So, this kind of network, involving important information transportation, requires safety guarantees. In view of the importance, this paper puts forward a network safety...
With the popularity of the third-generation and fourth-generation mobile phone services, the security of m-commerce operations already received more attentions. At present, the security mechanism of m-commerce operations rely on the encryption technology of subscriber identity module (SIM) card or the smart card textual password. Despite its security mechanism is stronger than the current Internet,...
In view of the current limitations of Internet security,it designed a system of encryption and authentication base on Internet system. It detail realizes network security features of data confidentiality, data integrity, data origin authentication and access control and so on. Combine the actual application, it given specific implementation of the encryption and authentication.
Classification of network traffic using port-based or payload-based analysis is becoming increasingly difficult with many peer-to-peer (P2P) applications using dynamic port numbers, nat techniques,and encryption to avoid detection. An alternative approach is to classify traffic by exploiting the distinctive characteristics of applications when they communicate on a network. We pursue this latter approach...
The increasing number of applications offering their services over peer-to-peer (P2P) platforms is changing the properties of the traffic within computer networks. Their massive use raises a few imperative challenges for network administrators and Internet service providers, regarding the quality of service and security of their networks. It such scenario, it is important to develop mechanisms to...
In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity...
We describe UV: a two-node system for unobservable voice communication on the Internet. UV provides unobservability of communication by hiding the fact that there is a conversation taking place. To achieve this, the system uses techniques such as encryption, constant traffic generation, equal packet sizes, and a fixed packet sending schedule. We evaluate the influence of the constant traffic generation...
Optimizing the single FPGA board resource as a simulator in a multi user environment regardless of the physical distance improved by TCP/IP. It is important step for IP and system development to use FPGA and IP core to design and improve flow of multi user data in a high speed communication internet environment and optimal utilization of available bandwidth. A user can connect either by Wi-Fi, Wi-Max...
Wireless Internet service providers need to secure their networks. Establishing a secure link between an access point and a client's Wi-Fi enabled device is a challenging issue. This paper provides an efficient cross-layer pairing protocol for internet WI-FI networks. The protocol uses information-theoretic security. We also present how to establish secure communication between clients' devices. Besides,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.