The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is a vision for interconnecting all of the world's "things" -- from vehicles to diet scales, smart homes and electrical grids -- through a common set of networking technologies. Realizing this vision using a host-to-host communication paradigm, such as that of the Internet Protocol (IP), is challenging in the context of highly heterogeneous, constrained devices...
There has been a huge growth in the number of wireless-enabled devices possessed by a user. Over two third of adults in United States currently own three devices — laptop, smartphone and tablet. In this paper, we provide a first look at the network usage behavior of today's multi-device users. Using the data collected from a large university campus, we provide a detailed measurement-based characterization...
Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of...
In this work, we maximize the secrecy rate of the wireless-powered untrusted amplify-and-forward relay networks by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). To guarantee secure communication, the destination-based artificial noise is sent to degrade the reception of the untrusted relay, and...
Based on the study of network borders and application characteristics of the State Grid, and also of the network technology and the communication operators network architecture, Power Grid network architecture, IP address allocation methods and safety protection are studied deeply, and then provide the network architecture, IP address allocation methods, safety protection applicable to the wireless...
Security is a critical success criterion for implementation and operation of Smart Grids at any scale. In this paper I describe the status and specifics of Smart Grids where data communication and automation networks are integrated with the power grid. Increased connectivity in order to achieve higher flexibility, visibility and better control presents many benefits. On the other hand, increased connectivity...
There is a big risk for public Wi-Fi users being tricked into connecting to rogue access points. Rogue access point is one of the most serious threats in WLAN, since it exposes a large number of users to MITM and evil twin attack. In this paper we propose a practical method that warns users to avoid connecting to the rogue access points. Proposed method compares the gateways and the routes that a...
In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane,...
VoIP (Voice over IP) systems are more and more replacing PSTN (Public Switched Telephone Network) infrastructures. This increases the dependency on available and secure VoIP systems for successful business. Attacks against VoIP systems are becoming more imaginative and many attacks can cause damage, e.g., gain money for attackers or create costs for the victim. Therefore, in this paper the current...
The international society of automation (ISA) is developing standards for industrial automation. ISA SP100 committee is working to establish the industrial wireless standard called ISA100. The ISA100 is targeted to be a family of compatible networks for the industrial manufacturing environment. The first release, ISA100.11a is being developed to be the universal industrial wireless network. This paper...
Since several years the number of VoIP (Voice over IP) infrastructures increases and, consequently, the number of VoIP users increases too. Under these circumstances VoIP systems get more and more attractive for attackers, since the probability of successful attacks increases and attackers gain benefits, e.g., money with fee-based telephone numbers. Therefore, this paper describes a solution to capture,...
Host-based mobility and multi-homing protocols allow hosts to change their location or network interface during ongoing sessions in a cost-efficient, technology-agnostic manner. Since these solutions enjoy resurgence with the rise in mobile internet traffic, they are faced with the problem of providing sufficient security without impairing the economical benefits. We present a lightweight security...
The impact of WPA2 security on performance of IPv4 and IPv6 on two client-server wireless 802.1 In networks implementing Windows Vista-Windows Server 2008 and Windows XP -Windows Server 2008 is investigated. Results indicated that for XP enabling WPA2 results in an average of approximately 7.07% less throughput than open systems for IPv4 and 5.42% less throughput for IPv6. Enabling WPA2 on Vista results...
A secure and effective handoff scheme is the key to guarantee seamless roaming of mobile terminals in all IP heterogeneous wireless networks. In the current work, Fast handoffs for mobile IPv6 (FMIPv6) can reduce the handoff latency, but the process of registration update badly affects the handoff efficiency, and it doesn't think of the necessary secure function when handoff across heterogeneous networks...
IPv6 over IEEE802.15.4 (a.k.a. 6LowPAN), has become the standard for low-rate wireless personal area networks (LR-WPAN). IPv6 is taken as an interconnection scheme for IEEE802.15.4 equipments at network layer, 6LowPAN technology has attracted extensive attention. This paper introduced IEEE802.15.4 standard and 6LowPAN technology, discussed 6LowPAN's advantages, analyzed its key technologies, and the...
The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. There has been extensive work on improving the security of IEEE Standard 802.16 for both fixed and mobile networks in PMP mode, but thus far there is scarcity of research on security...
We propose in this paper a framework for digital investigation of security incidents in multi-hop wireless systems. A cooperative observation network, composed of randomly distributed observer nodes, is set up to monitor nodes mobility, topology variation, and patterns of executed actions. A set of techniques to aggregate, merge, and analyze evidences is proposed to reconstruct potential attack scenarios...
A novel video monitoring system is proposed to provides a more excellent solution for security. The core architecture of this system is constructed by using wireless mesh network (WMN), which has emerged in recent years. WMN is dynamically self-organized and self-configured and can provide better services than other wireless networks. The basic network of this system is divided into two layers: access...
IP over TETRA is a solid and robust platform for secure and reliable data communications in the field of public safety and in for other PMR applications. In the paper the basic concepts of WAP application over TETRA network are presented. WAP over TETRA trial architecture is shown and an example of Web application ldquodangerous goodsrdquo is demonstrated. TETRA enhanced data services offered by TETRA...
This paper deals with the problem of security aspects in future mobile networks. Security is important to be recognized in mobile networks for current and future users and implements. In the first par of this presentation, security concepts together with infrastructure security are presented. Five security features groups are emphasized. The second part treats the problem of security context together...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.