The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless body area network (WBAN) is an emerging technology that focuses on healthcare monitoring in indoor and outdoor areas. WBAN technology allows medical sensors to collect vital physiological data and transfer it from a source to a destination via low-energy communication. To be able to encrypt and decrypt healthcare data, it is important for medical sensing and health-related devices to generate...
Base on the current situation of the development of wireless medical, according to the multi-frequency and broadband MIMO road medical special wireless network system (WIDS) safe use problem, the WIDS themselves security, stability and continuity of network transmission, wireless network impact on human health and the medical equipment is discussed and studied. Based on the research of the system...
Nowadays almost every industry is knowing a rapid development and the aviation industry is no exception thus it is crucial to enhance the focus on network security concerning new Aircraft Data Communication Systems, seeing that the current networks, regarding deployments, are mainly wired technology. Based on the above, many aerospace working groups have already begun actualizing the idea of creating...
In this paper we study a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via wireless transmission to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators...
We consider a surveillance system for public transport vehicles, which is based on the collection of on-board videos, and the upload via mobile network to a central security system of video segments corresponding to those cameras and time intervals involved in an accident. We assume that vehicles are connected to several wireless interfaces, provided by different Mobile Network Operators (MNOs), each...
This paper surveys, reviews and describes an airbase (an airport) protection system and airport surveillance system based on wireless network and surveillance technology. The goal of this paper is to present the proposed airbase protection system in terms of ground surveillance that increases the performance, efficiency and capability to the system and users (such as soldier, officer, air traffic...
The real-time packet scheduling algorithm with security constraint can enhance the scheduling as well as security of the real-time packets over the wireless network, especially wireless local area network (WLAN). The existing real-time packet scheduling algorithms focus on scheduling and paid less attention on security when system is heavily loaded and when the system is under light work load, the...
WiFi has been adopted into enterprise production environment in larger scale, yet the flexibility of WiFi network also exposes more vulnerability to current security defense systems and introduces greater challenges to network security for modern enterprises. In wireless world, there are many dead corners that traditional firewall and intrusion detection system cannot cover. Modern enterprises are...
International Society of Automation and Fieldbus Foundation are collaborating to develop a technical report describing the architecture of wireless backhaul in the plant or factory. The report describes crucial perspectives to integrate the backhaul, such as security, flow control, network management, fault tolerance and more. Therefore, it will help users to utilize the backhaul for not only sensor...
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing...
This paper presents the work that is currently performed in the E-SPONDER (FP7–242411) project. E-SPONDER is a suite of real-time data-centric technologies which will provide actionable information and communication support to first responders that act during normal and abnormal events (crises). This information will enable improved control and management, resulting in real time synchronization between...
This paper proposes a wireless network security evaluation method based on Fuzzy-AHP (Analytic Hierarchy Process) with variable weight. In this paper, we first design the evaluation index system based on characteristics of wireless networks, and then analyze each uncertainty measured by the Fuzzy-AHP method, and introduce variable weight theory into Fuzzy-AHP method to address the difficulty of weight...
Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. There is performance issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. Securing the open access to avoid attacks at the physical and MAC layer with high speed performance during authentication is considered...
Computer networks are typically a shared resource used by many applications for many different purposes. Sometimes the data transmitted between application processes is confidential, and the application users would prefer that others not be able to read it. A firewall is a specially programmed router that sits between a site and the rest of the network. It is a router in the sense that it is connected...
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
Internet Security mechanism of itself is more vulnerable. While coupled with the inherent openness of wireless network media and the limitations of mobile storage and computing resources in the wireless network environment, it does not only have to be encountered with the security threats in the cable network environment but also the emerging wireless-specific threats to the wireless environment....
A personal area network (PAN) performs a variety of tasks, in accordance with the requirements of the applications that are being used. A key determinant of PAN success is the application areas that will be the most popular and widespread. This research determines the applications that are most important for the future success of personal area networks. An initial set of six applications was identified...
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question ldquowhat are the link-level secrecy capacity gains from cooperation?rdquo, this paper attempts to answer the question...
There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology. The contrast between wireless usage and security techniques growing, show that the security is not adequate enough for this data growing. Itpsilas obvious that the hackers are able to monitor the transmitted data and hack whatever...
The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of the wireless networks. In this paper, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, which let the attacker's signal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.