Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would...
Providing a suitable key agreement protocol in ad hoc networks is challenging due to all the characteristics of these networks, such as dynamically changing topology and limitations of power, computation capability and storage resources. In this paper a novel group key agreement protocol based on a key tree for ad hoc networks was proposed. In this protocol weil paring is employed on a binary tree...
In this paper, we study the physical layer security for the 3-receiver broadcast channel, which is useful in describing the wireless broadcast scenario, where a private message is kept secret from one of the receivers. This model is more general than the previously studied broadcast channels with private messages, since conditions on the receivers are general, and the wiretapper receives the common...
In mobile ad-hoc networks, the data tends to be intercepted by malicious node when using a single path for transmission. In this paper, we propose a secure routing protocol based on multipath routing technology, namely AODVsec, which divides a data unit into several data pieces and transmits these pieces through different paths. By setting security level on each node, AODVsec limits the maximum number...
Multicast communication in dynamic environments like ad hoc networks are potentially of critical concern. As group members move in and out of the group, in order to preserve confidentiality, it becomes imperative to use cryptographic keys with rekeying mechanism each time a user enters or leaves. Therefore, in dynamic environments rekeying introduces a significant computational and communication overhead...
Nodes in ad hoc networks often self-organize into clusters in which a node need anonymously prove the membership in some scenarios. For a self-organized cluster, any node should have the capacity to act as the cluster manger and use varying pseudonyms to keep privacy while the procedure of reissuing key is not desirable. Dynamic group signature schemes provide a probable solution, but are inappropriate...
Distributed Denial of Service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing, which is exploited by attackers to conceal source IP addresses and localities of malicious traffic. In this paper, we propose HPi (Hash-based Path Identification), a novel packet marking scheme to defeat DDoS attacks regardless of forged...
Wireless mesh networks consist of stationary nodes that communicate over wireless connections. Since WLAN security standards are only applicable in the standard scenario where the access points are connected by a cable-bound backbone, nearly all mesh networks broadcast messages in the clear. To secure these networks, and to reduce the amount of reencryption of messages, we propose to use group key...
With the growth of decentralized network users, preserving privacy becomes a critical issue in this open community. Kad-based network, as a typical decentralized system, has been widely used nowadays. However, there is not enough research to achieve anonymity on it. In this paper, we propose an anonymous protocol based on Kad network, named Anonymous Kad (A-Kad), which achieves complete privacy and...
On Internet, the sender and receiver can not own the secure communication channel. Eavesdropping can attack the insecure channel to break the process of the signature scheme. Under an unsafe routing path, several attacks from Eve will be happened. In quantum cryptography, these physics properties such as no-cloning theorem, uncertainty principle and quantum teleportation can provide unconditionally...
The management of broadcast-key is one of the most important security problems in the distributed wireless sensor networks. Firstly, the broadcast-key should be calculated and used by each node. Secondly, the broadcast-key should also be updated according to the variation of security condition. In this paper, we propose a new broadcast-key management scheme which has many advantages over the famous...
Most of sensor network applications rely on deploying large amount of sensor nodes in unattended areas, leaving sensor nods suffer from node capture attacks in which the adversary compromises the node and retrieves secret information from the node. Moreover, the adversary can launch node replication attacks or clone attacks by loading secret information into several replicated nodes and rejoining...
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high-performance implementation of...
Universal plug and play, or UPnP in short, is a ldquoplug and playrdquo methodology used in network environment. It's designed to share resources, connect network devices and offer control over services. It implements zero-configuration. Developer can save the cost of network setup and concentrate on the offering services only and do not need to concern the under layer protocol. As the wide spreading...
This paper considers the problem of packet classification in a co-mingled traffic stream. Given an encrypted co-mingled stream consisting of different protocol flows originating from different sources; we investigate if it is possible to assign packets to their respective sources and identify the protocol for each source. Encryption makes it difficult to obtain any information from packet headers...
This paper firstly gives security analysis for current AAA architecture, and presents an optimal AAA key agreement mechanism based on XTR algorithm, including three kinds of keys in different domains and anonymous identity verification mechanism to ensure communication security between Pac and NAS. Final test for the comparison with common algorithm in AAA application proves that the optimal algorithm...
This article addresses a new area of sensor networks - the anti-sensornet. Though the term anti-sensornet is scattered throughout literature, there is no systematic description of the anti-sensornet. In this article, we provide an introduction to anti-sensornet by analyzing the behaviors of intelligent intruders and the methods used to confront them including hiding sensor networks, enhancing detection...
Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the basestation. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence is critical to the smooth functioning of a sensor...
A Wireless Sensor Network (WSN) contains several sensor nodes with very limited sources such as a small microcontroller and a battery. These features usually result in difficulties in employing most of the conventional wireless network protocols (e.g., security protocols) unfavorably. Research on especially increasing reliability of the WSNs employed in health applications recently receives a remarkable...
In crypto-partitioned networks classified clear text enclaves (i.e., red enclaves) are interconnected over an enciphered unclassified transit network (i.e., black network) via IPSEC tunnels. Thus, packets are encrypted before they are allowed to cross from red networks to a shared black network. Currently, there is no solution that can provide efficient end-to-end IntServ QoS signaling across crypto-partitioned...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.