The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Roadside units (RSUs) aided certificate service is a promising approach for ensuring security and privacy preservation in vehicular ad hoc networks (VANETs). In existing approaches, a vehicle can update certificate only when it passes by RSUs, however, this is impractical in many scenarios. Consequently, if there are no RSUs on the original driving trip, drivers have to adjust routes which means wasting...
In virtue of its widespread application scenarios, especially in battlefield communication, disaster rescue, satellite and deep-space transmission, Delay-disruption Tolerant Network (hereinafter referred to as DTN) has become one of the most attractive focuses in research for future Internet. Due to the intermittent connectivity, mobility of nodes, signal interference, jamming in DTN, there exist...
The following topics are dealt with: neural networks; equalisation; mobile and cellular communications; optical communications; data security; human factors in communications; coding and modulation; optical networks; database and optimisation; time-frequency analysis; computer vision and recognition; audio and speech processing; wireless networks; watermarking; digital filters; network coding and...
The wireless networks are running following a serious of mechanisms, which is the composition of various networks mechanisms. However, the existing security framework is built for a single or independent network, far from the real heterogeneous networks. In this paper, based on the traditional framework in wireless networks, a trusted and secure framework is proposed to manage the credibility of the...
Support of P2P communities in mobile environments is a challenging task. To this purpose numerous algorithms have been recently proposed to speed up resource search throughout the network. Among these, structured DHT approaches seem very promising since they allow for a successful resource search by keeping complexity low. One of these techniques denoted as Georoy, was recently proposed with the aim...
Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the basestation. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence is critical to the smooth functioning of a sensor...
We analyze the ability of a stochastic coverage algorithm to achieve both accurate threat-based coverage and effective information capture. When mobile sensors are used to cover the region over time, the goal of threat-based coverage is to allocate the sensors' coverage time between the subregions in proportion to their threat levels. We show that, in contrast to prior results on mobile coverage for...
A network intrusion detection (ID) system detects malicious behavior by analyzing network traffic. Malicious behavior may target the disruption of communications, infrastructure services, and applications. A number of ID techniques proposed for dynamic wireless networks (e.g., sensor, ad-hoc and mobile ad-hoc networks) are based on the creation of an overlay hierarchy or other structure to organize...
Mobile networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet protocol (IP) networks has led to the network mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for mobile IP (MIP). The current work is based on the use...
Motivated by the phenomenal capabilities of the human immune system (HIS) in defending the human body against dangerous foreign agents, this paper proposes an HIS-inspired survivability framework to address security threats in Next Generation Mobile Networks (NGMN). In particular, the proposed framework incorporates two key components: namely, the attack detection framework and the security control...
We have been developing audio watermarking techniques which enable extraction of embedded data by mobile phones. Applying acoustic interpolating phenomena of our human auditory organs, we could embed data onto full phone-line frequency ranges, where our auditory response is prominent in order to make possible to extract data with widely used 3-G mobile phones. We are interested in applying this technique...
Wireless sensor networks (WSNs) have emerged as an important application area resulting from the advancement of efficient short-range radio communication and miniaturization of computing devices. Nodes in such a network generally remain in an unattended environment and thereby they are prone to attack by adversaries. Therefore, the need of defending such attacks is of utmost importance. This paper...
In this paper, we study the challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, only a few solutions were proposed. In this paper, an Efficient and Distributed Detection (EDD) scheme and its variant, SEDD, are proposed to resist against node replication attacks in mobile sensor networks. The characteristics possessed by...
Mobile wireless networks continue to be plagued by theft of identity and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a weighted-dissimilarity-based anomaly detection method that can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm,...
A distributed security MIPv6 model based on dynamic policies is presented to solve the security compatible problem between MIPv6 nodes and the access network. We combine the distributed defensive structure and MIPv6 to build a distributed secure MIPv6 structure based on policies, and implement the dynamic transference of secure policies during mobile nodespsila movement, thus to make the model has...
User authentication is the most essential procedure to ensure that the service is properly used for Wireless Mesh Networks (WMN). This paper addresses the authentication of WMNs, which is a key impediment to all kinds of applications of WMNs. In this paper, Wu et al.'s scheme is analyzed as an example and weaknesses of which are discussed. Then, an improved user authentication scheme is proposed by...
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The paper illustrates a novel distributed protocol for multi agent environments to improve the communication security in packet-switched networks. To enrich the overall system security the approach makes use of distribution and double encryption and some...
This paper proposes an adaptive sampling strategy to address the accuracy and scalability issues of anomaly detection at high-speed backbone side of next generation mobile network (NGMN). The proposed sampling strategy is formulated based on the network traffic condition. It is constituted by two important functions namely the traffic identification and the sampling decision. While the former utilizes...
Nowadays, many intrusion detection and tolerance systems have been proposed in order to detect attacks in both wired and wireless networks. Even if these solutions have shown some efficiency by detecting a set of complex attacks in wireless environments, they are unable to detect attacks using transaction based traffic in wireless environments. In this context, we propose an intrusion detection and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.