The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increased popularity of IEEE 802.11 LANs (WLANs) in residential (home) environments leads to dense, unplanned and thus chaotic deployments. Access Points (APs) are frequently deployed unfavorably in terms of radio coverage and use interfering frequency/power settings. In fact, in some parts of a one's apartment the usage of the neighbor's AP might be preferred as it might provide better signal...
This paper presents a wireless intrusion prevention tool for distributed denial of service attacks DDoS. This tool, called Wireless Distributed IPS WIDIP, uses a different collection of data to identify attackers from inside a private network. WIDIP blocks attackers and also propagates its information to other wireless routers that run the IPS. This communication behavior provides higher fault tolerance...
Automation Technologies are on a rise today as their use has reduced the efforts of humans manifold. The concept of automation has its roots today from industrial to consumer grade applications. Smart Home Automation is one such concept evolved from a broader category of Building Automation. The advancement of many wireless technologies today like Bluetooth, Wi-Fi, RF, Zigbee, WiMAX, Zwave, etc paved...
Both authentication and deauthentication are instrumental for preventing unauthorized access to computers and other resources. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is not considered mandatory. A user who leaves a logged-in workstation unattended (especially for a short...
Wireless mobile communication have grown dramatically in last decades. Due to increased usage of wireless mobile networks and communications in our everyday life, the society has become extremely exposed to cyber security attacks and threats in this environment. In order to provide a basis for further in detail discussion on attacks and security mechanisms in this challenging environment, this paper...
Recent technological advancements have led to a deluge of data from distinctive domains over the past several years. In addition to its sheer volume, big data also exhibits other unique characteristics as compared with traditional data. For instance, more and more data-centers which host various ‘big-data’, and those centers need to be networked for exercising Cloud-computing. This development calls...
When information exchange occurs between people via a network, then authentication and security of data have more priority. This paper introduces a low cost, handheld, wireless electronic notice board by using Atmel's ATmega32 microcontroller and different wireless technologies (Bluetooth and ZigBee) and their performance analysis based on the parameter such as range, BER (bit error rate), RSSI (Received...
Information-centric networking (ICN) enables communication in isolated islands, where fixed infrastructure is not available, but also supports seamless communication if the infrastructure is up and running again. In disaster scenarios, when a fixed infrastructure is broken, content discovery algorithms are required to learn what content is locally available. For example, if preferred content is not...
Use of wireless technology is applicable in most of area in information and communication technology (ICT). Rapid growth of user and devices make provider have difficulties to handle large data traffic in current system. Provider has to setup large size data center (server) to accommodate increasing number of user and data. Stability and availability of data center need to be on all the time, thus...
Information-centric networking (ICN) is a promising approach for wireless communication because users can exploit the broadcast nature of the wireless medium to quickly find desired content at nearby nodes. However, wireless multi-hop communication is prone to collisions and it is crucial to quickly detect and react to them to optimize transmission times and avoid spurious retransmissions. Several...
Unmanned control vehicles are used for a variety of scenarios where the user can conduct a task from a remote location, scenarios include surveillance, disaster recovery and agricultural farming. The operation of unmanned vehicles is generally conducted over a wireless communication medium. The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through passive and...
The ARTEMIS 1 project DEWI ("Dependable Embedded Wireless Infrastructure") focusses on the area of wireless sensor / actuator networks and wireless communication. With its four industrial domains (Aeronautics, Automotive, Rail, and Building) and 21 clearly industry-driven use cases / applications, DEWI will provide and demonstrate key solutions for wireless seamless connectivity and interoperability...
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally implemented over wireless networked control systems (WNCS). The nature of the wireless broadcast allows attackers to exploit security vulnerabilities through...
Medical systems are designed for a range of end users from different professional skill groups and also people who carry the devices in and on their bodies. Open, accurate and efficient communication is the priority for medical systems and as a consequence strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional...
The use of wireless sensor networks has enabled the process industry to collect a vast amount of hitherto unknown data by making physical monitoring of the underlying processes and equipment practically and economically possible. Wireless communication has led to new applications in the field of wireless process automation which in the past were subjected to economical, physical and technological...
IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed environment for a site to site IPSec, we present new results on performance of IPSec for both IPv4 and IPv6 using Fedora 15 operating system and wireless network. Compared to open system,...
The ever-increasing demand for networking of high-bandwidth services in existing homes has resulted in several options for implementing an in-home network. Among the options are power-line communication techniques, wireless links, and glass single-mode optical fibers. Whereas it is easy to install high-bandwidth optical fibers during the construction of new living units, retrofitting of existing homes...
Aging plants and reduced workforces are causing commercial nuclear power reactors to limit the extent of their predictive maintenance programs to only critical to safety and critical to operation systems. Some sites are even forced into living with a reactive maintenance strategy for all but the most critical systems. This typically leads to significant expense through costly downtime and component...
In general, the world's nuclear power fleet is comprised of facilities that were built on designs created nearly a half century ago. There are numerous instances of original vintage equipment still installed and operating in these plants. This absence of modernization is due to many factors including the reliability of the existing equipment, lack of confidence and operating experience of digital...
The problem we consider is the security communication in MISO (Multiple-input Single-output) scenario. The scenario is connected via wireless signal between two points: the transmitter and the receiver. We assume that transmitter has multiple antennas while receiver has one. In recent papers, they assume that the useful information can be received by the indeed receiver completely but not the eavesdropper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.