The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents a brief overview of routing protocols in wireless ad-hoc networks. The main focus is on solving security issues. We conclude that the concept of trust is fundamental in the design of secure routing protocols today. Based on SAR (Security-Aware Ad-hoc Routing) protocol, we propose a role-based approach to secure routing. This approach enhances the flexibility and security of information...
Virtualization is emerging as an efficient resource utilization method that eliminates dedicated physical devices. Virtualization has been widely used in computer systems such as virtual memory, virtual storage access network and wired networks - and most recently in cloud computing - to enhance the network performance, resource utilization and energy efficiency, and to achieve performance isolation...
After careful consideration of security problems of WiMAX network and based on the specification of the WiMAX itself, in this paper we have taken a novel approach to these issues by designing a WiMAX-based energy efficient intrusion detection system that has better performance and is more efficient. Our investigations indicate that this intrusion detection system can provide both an acceptable application...
This paper provides on introduction on key strategy for wireless sensor network. Many key Strategy are focus on proposed pair wise based on key strategy technique. Key management Mechanism Provide a security over a Wireless sensor network. Many Scheme are focus on proposing new pair wise based key management strategy. The key management mechanism combines trusted-server and key pre-distribution scheme...
Nowadays organizations are likely to have Internet presence and this has led to a significant increase in all kinds of network attacks. Network security became one of the highest priorities to protect valuable data from unauthorized access. One of the solutions to protect against illegal access is to use a firewall. A firewall is a device designed to permit or deny network traffic. This paper will...
In this paper, the recent research on secure transmission of network coding in wireless networks is reviewed. Security risks have become a major problem to the development of wireless networks, and network coding is the development trend of next generation secure networks. Firstly, the brief concept of network coding is introduced. Secondly, up to date related research on secure network coding in...
Key management is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly deployed in a hostile territory However, due to the resource constraints, achieving such key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key-based schemes, are not suitable for wireless...
With the development of wireless local area network (WLAN), the problem of WLAN security becomes increasingly severe. This article discusses the security issues that should be taken into consideration in the construction of WLAN. Besides, this paper comes up with two types of intrusion detection structures on the basis of infrastructure mode and mobile AD HOC network mode respectively, therefore,...
Network Security represents a continuously moving target, which has to be reached in order to assure the desired level of confidentiality, integrity and availability for the network systems and services. In this case, one of the most important steps in setting up a new (WiMAX) network is the definition of the security plan. At the end of the paper, after taking it step by step, we will have an interdependent...
Channel assignment is the key problem in the research of the next-generation wireless mesh networks (WMN) in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes and one of several channels. Recent research indicates that the use of channel assignment technology could reduce the interference and increase the throughout of WMN effectively....
Security audits and penetration testing exercises serve to determine the baseline of the security in a network/system and to identify possible avenues of exploitation. Red and Blue Team is the name given to the combined execution of these risk assessments that consist of various operational, managerial and technical activities. However, to successfully complete a combined Red and Blue Team Mission...
This paper presents the results obtained in the development of a security mechanism for Web access control based on IEEE 802.11 mobile stations indoor location. The goal of the mechanism is to permit the control of the Web access made by students in an academic environment according to the classroom they are in. The access is controlled by a location server, which dynamically interacts with security...
The pervasive nature of wireless devices and the arbitrary organization of mobile networks attract growing interest in the design of wireless and mobile ad hoc networks. However, malicious nodes always exist due to the vulnerabilities of wireless and mobile nodes and thereby their misbehavior can weaken the utilization of ad hoc networks. Therefore, addressing security issues becomes extremely important...
Location information has been found useful in the design of key predistribution schemes in wireless sensor networks (WSNs). In this paper, a novel key management scheme based on location is proposed to enhance the security of the wireless sensor networks. We get the idea from the previous location-based key (LBK) scheme but here the location of a sensor node is described by its neighbors' logical...
In recent years there has been an immense proliferation of wireless networks and they are becoming increasingly vulnerable to attacks. Thus there is a serious need to secure such networks from attacks. Usually an attacker can penetrate into a network by utilizing a chain of exploits. An exploit is a small piece of code that makes use of vulnerabilities present in a service or in a system. Each exploit...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network. The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose an efficient self-healing...
IEEE 802.11 set of standards grew from a highly obscured and unsecured technology to a robust and reliable solution for many of us. Broad acceptance and relatively simple implementation also made 802.11 a perfect target for possible exploitation. Recently discovered wireless driver vulnerabilities exposed a new critical threat that legitimate users community is facing. What makes this vulnerability...
The security of wireless and mobile networks has an important influence on the performance of these networks. As a result, many approaches have been developed to enhance their security. Recently, the technique of trust and reputation evaluation has attracted much interest, since it can evaluate the trustworthiness of nodes in a centralized way. This paper addresses the issue of efficient reputation...
Due to the wireless nature of ad hoc networks, two nodes out of mutual communication range need intermediate nodes cooperative to implement applications, such as resources discovery and packets forwarding. Trust evaluation between two peers directly affects the security and performance of networks. In this paper, a novel trust evaluation model is proposed for ad hoc networks. In this model, based...
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of the information from the eavesdropper. We profile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.