The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
The introduction of verifiable computation came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted servers and also to the growing desire of weak clients to outsource computational tasks to more powerful computation services like in cloud computing. Verifiable computation enables a computer to offload the computation of some function, to other perhaps...
Information Centric Networks (ICN) is very promising for Internet of Things (IoT) deployment, where the data-centric approach is useful in reducing the data retrieval latency as well as the network traffic for IoT services. Also, the innetwork caching capabilities in ICN limits the massive data access to the data producers and so relaxes the need of continuous connectivity E2E connectivity between...
Security is one of the major challenges that affect the deployment of the biosensors that form Wireless Body Sensor Networks (WBSNs). However, the implementation of any security protocol will result in the introduction of additional functional blocks to the device, which invariably lead to an increase in power consumption and processing delay. Both aspects are of critical importance to biosensor nodes...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
The implementation of security protocols within Wireless Body Sensor Network (WBSN) creates chances for more observations in the sake of performance evaluation. The robustness of such protocols can be verified by formalizing its components using different techniques. In addition, simulating the security protocol can provide an insight into several design parameters, such as response to inputs, and...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down M2M growth and...
Lightweight virtualization, as implemented by application container solutions such as Docker, have the potential to revolutionize the way multi-tier applications are developed and deployed, especially in the cloud. The success of application containers can be partly attributed to their ability to share resources with the underlying platform that hosts them. As such, the isolation provided by such...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
The Domain Name System (DNS) is used in the Internet to map Fully Qualified Domain Names to IP addresses. As the Internet continuously grows, there have been challenges in keeping up with the demands on the DNS service. Recently, ICANN announced the introduction of new generic Top-level Domains (gTLDs). Using packet traces collected from a large edge network, we analyze the usage of TLDs between 2008...
Recently, smart home appliances and wearable devices have been developed through many companies. Most devices can be interacted with various sensors, have communication function to connect the internet by themselves. Those devices will provide a wide range of services to users through a mutual exchange of information. However, due to the nature of the IoT environment, the appropriate security functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.