Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This article aims to build a misuse Wireless Local Area Network Intrusion Detection System (WIDS), and to discover some important fields in WLAN MAC-layer frame to differentiate the attackers from the legitimate devices. We tested several machine-learning algorithms, and found some promising ones to improve the accuracy and computation time on a public dataset. The best performing algorithms that...
Vehicular Ad hoc network (VANET) is an emerging technology that supports several applications related to safety and comfort. Its life saving characteristic has attracted the industry and research communities while its mobility, lack of infrastructure and serving wide spectrum of applications make it vulnerable to several kinds of attacks. VANET applications have stringent security requirements, as...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
Wireless communication faces several security risks. An attacker can easily inject bogus packets, impersonating another sender. We refer to this attack as a spoofing attack. An attacker can also easily eavesdrop on communication record packets, and replay the (potentially altered) packets. In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing...
Security audits and penetration testing exercises serve to determine the baseline of the security in a network/system and to identify possible avenues of exploitation. Red and Blue Team is the name given to the combined execution of these risk assessments that consist of various operational, managerial and technical activities. However, to successfully complete a combined Red and Blue Team Mission...
The recent spread of communicable diseases like swine flu, disasters like stampedes and ongoing security issues have made management of large crowded events more critical than ever before. Managing large crowds is a very complex, challenging and costly exercise. Many of the problems encountered in crowd management can be minimized by the use of RFID and other wireless technologies. These technologies...
Wireless sensor networks (WSNs) have been deployed largely due to recent advances in wireless communication technologies. These sensors may be deployed in adverse or even hostile environments so they should consider security issues in their communications. In this paper we proposed sectorized location dependent key management (SLDK) based on Anjum's LDK algorithm in which generation of link securing...
IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast streams using Wi-Fi networks. However, multicast over Wi-Fi suffers from several well-known problems such as low data rate, high losses and unfairness vis-a-vis other contending unicast transmissions. In this paper we present DirCast,...
Recently, several research contributions have justified that wireless communication is not only a security burden. Its unpredictable and erratic nature can also be turned against an adversary and used to augment conventional security protocols, especially key agreement. In this paper, we are inspired by promising studies on such key agreement schemes, yet aim for releasing some of their limiting assumptions...
With the rapid development of wireless communication, it is an inevitable trend that WLAN as a wireless access mode will integrate with 3GPP system and form the interworking network. How to realize the fast and authentic handover scheme of WLAN-3GPP interworking network becomes one of the focus issues in this field. In view of the weaknesses of existing handover schemes, this paper proposes an improved...
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles in the...
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security. We conduct our studies on both dominant and original systems, where in a dominant system each terminal always has a packet in its buffer unlike in the original system...
The platform for the railroad is not sufficient to provide intelligent services. Currently, the railroad system provides limited services. However, the demands for information related to environments of train are increasing. In this paper, we propose the platform which can provide context-aware information services, intelligent services and integrated services quality of service. It can establish...
Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper, a scenario in which the relay is equipped with multiple antennas is considered...
We consider a cooperative wireless network, and exploit node cooperation for achieving physical layer based security. The case of one source, multiple cooperating nodes and one eavesdropper is considered. Two different cooperation schemes are considered. In the first scheme, cooperating nodes transmit a weighted version of the source signal in a decode and forward fashion (DF). In the second scheme,...
Deployment of wireless sensor nodes as a result of extensive, easily captured by the enemy, resulting in the leakage of key. In order to ensure the secure communications of wireless sensor networks, this paper advances a scheme, which repuires each node update the original key at given intervals, and discards the original key. In this way, even if the enemy captures the sensor nodes, they could only...
We introduce a new method for radiometric fingerprinting that detects the unique variations in the antenna, oscillator properties, as well as the digital and analog interfaces of the radio by passively monitoring the radio packets. Several individual identifiers are used for extracting the unique physical characteristics of the radio, including the frequency offset, modulated phase offset, in-phase/quadrature-phase...
The following topics are dealt with: grid and cluster computing; performance evaluation and measurement; architectures and systems; wireless and mobile communications; network communications; security and privacy; reliability and fault tolerance; data mining and caching; AHPCN; multicore and multithreaded architectures and programming; network storage and data management; and parallel algorithm and...
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static...
In this paper, the WirelessHART communication scheme is investigated. The protocol is at first described, in order to underline the key aspects of its design; then, a simulation tool is presented: it enables analysis that accounts for both protocol and physical layers issues. In particular, interference effects on protocol choices can be easily analyzed. The experimental results, obtained from simulations,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.