The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes a secure Network-on-Chip (NoC) approach, which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routing guarantees that the sensitive traffic communicates only through trusted nodes, which belong to a security zone. As the shape of the zones may change during operation, the sensitive traffic...
SDN network’s policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting those conflicts is a laborious and challenging task. This paper presents two-fold contributions. First, we devise an offline method for detecting unmatched OpenFlow...
Internet of Things (IoT) is characterized by heterogeneous devices that interact with each other on a collaborative basis to fulfill a common goal. In this scenario, some of the deployed devices are expected to be constrained in terms of memory usage, power consumption and processing resources. To address the specific properties and constraints of such networks, a complete stack of standardized protocols...
In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Low Power and Lossy Networks (LLN) are characterized by stringent energy constraints and frequent communication errors. Recent research in the area of LLNs has focused in solving many issues like security, energy efficiency, and routing. RPL is a new routing protocol proposed for LLNs by IETF ROLL group. RPL provides opportunities for improving overall performance of LLN by providing mechanisms for...
Although widely deployed in recent years, the IPv6 protocols still have many security problems, especially the Man-In-The-Middle Attack in LAN (Local Area Network). In this paper we present an Address Forging and Data-Gram Forwarding based IPv6 Man-In-The-Middle Attack testing system to help user aware the security risks in IPv6 Networks.
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
Hierarchical based formation is one of the approaches widely used to minimize the energy consumption in which node with higher residual energy routes the data gathered. Several hierarchical works were proposed in the literature with two and three layered architectures. In the work presented in this paper, we propose an enhanced architecture for three layered hierarchical clustering based approach,...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
In this paper, we investigate malicious detection and avoidance of black hole attack for smart meter network. In terms of routing protocol, the reactive routing protocol Ad hoc On-Demand Distance Vector (AODV) is commonly adopted for smart meter network and is considered in our paper. However, the default AODV is vulnerable to black hole attacks. To detect and avoid black hole attacks, we propose...
A group of mobile nodes with limited capabilities sparsed in different clusters forms the backbone of Mobile Ad-Hoc Networks (MANET). In such situations, the requirements (mobility, performance, security, trust and timing constraints) vary with change in context, time, and geographic location of deployment. This leads to various performance and security challenges which necessitates a trade-off between...
Reverse Path Forwarding based multicasting used in Distance Vector Multicast Routing Protocol (DVMRP) has the major drawback of generating large number of duplicate and prune packets. Use of the concept of pseudo diameter reduces the number of duplicate packets. The reason is that pseudo diameter helps in the reduction of the scope of travel of a packet. In this work a new approach of multicasting...
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can...
Software Defined Networking (SDN) is increasingly being used in data centers as well as enterprise networks. In an environment that has strict compliance requirements, such as HIPAA compliance, a critical role for an SDN controller is to route all data packets while considering data privacy preservation and compliance-preservation. In this paper, we address this problem by proposing a routing protocol...
Connected Vehicles (CVs) can be exposed to black hole attacks that deceive legitimate nodes by falsifying an attractive route to a destination node. This occurs when an attacker sends a packet to the source node confirming the existence of a fresh route. In this paper, we propose a Black Hole Detection Protocol (BlackDP) that works on a highway divided into clusters and monitored by Road Side Units...
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In this demonstration, we showcase the Secure Opportunistic Schemes...
Space self-organizing network is a kind of space communication network, which applies self-organizing network to deep space. Future space exploration demands a self-organizing network that will be able to connect spacecrafts with one another and in turn with Earth's terrestrial Internet and hence efficiently transfer data back and forth. The coverage area of the space self-organizing network is large,...
Delay tolerant networks (DTNs) are widely adopted to many network applications, such as disaster recovery and battlefield communications. Such critical network scenarios call for an outright prevention mechanism against contact-based attacks, e.g., blackmailing a legitimate user to compromise sensitive information at a contact. To the best of our knowledge, there is no work on secure routing protocol...
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.