The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
Security always comes with a price in terms of performance degradation, which should be carefully quantified. This is especially the case for wireless ad hoc networks (WANETs), which offer communications over a shared wireless channel without any preexisting infrastructure. Forming end-to-end secure paths in such WANETs is more challenging than in conventional networks due to the lack of central authorities,...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
In this paper, we propose a strongly resilient polynomial-based random key pre-distribution scheme for multiphase wireless sensor networks (RPoK): a private sub-key is not directly stored in each sensor node by applying the polynomial-based scheme to the RoK scheme. Such a polynomial is linearly transformed using forward and backward keys in order to achieve the forward and backward security of polynomials...
Security Information Fusion System has recently become one of the major topics in the research area of information security. A great deal of security devices and components have been deployed in network information systems. While improving the systems security performance, they produced lots of redundant or unreliable information. Through the technologies of alert fusion and correlation analysis,...
The Sybil attack is exceedingly detrimental and subtle to routing mechanism in ad-hoc network. In this paper we propose a framework in which the vulnerability to the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out under our extended strand space mode in order to further analyze the validity of the threats from the Sybil attackers...
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can't reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls...
The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph...
In this paper, we first analyze the novel 3GPP SAE AKA protocol proposed by Deng et al., and point out the flaws of protocol's authentication, and then we give an attack to the protocol. Moreover, we propose an improved 3GPP SAE AKA protocol, which can keep the frame of the 3GPP's protocol and overcome the security shortages of the D-AKA protocol. Finally, the security of the improved protocol is...
Nowadays, with the rapid development of industrialization and urbanization, national security situation become more and more serious. Although various security facilities have played a positive role in the field of social security prevention, there are some defects with poorly designed and personnel protection, physical protection, and electronic protection formation non-integration. The effectiveness...
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the transmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative...
As RFID technology being applied more and more widely, its security and privacy problems are increasingly called into question. Means of RFID attack emerge in endlessly and RFID security becomes a relatively new research area. This paper makes research on one of the attack methods - Denial of Service (DoS). We thoroughly expound and analyze the active jamming to the RFID system which, mentioned as...
To protect our networks against malicious intrusions, we need to evaluate these networks security. Previous works on attack graphs have provided meaningful conclusions on security measurement. However, large attack graphs are still hard to be understood vividly, and few suggestions have been proposed to prevent inside malicious attackers from attacking networks. To address these problems, we propose...
Survivability represents an important property of an information system which must withstand devastating malicious attacks and system failures, as well as continuously provide essential services to users. In this paper, we qualitatively analyze a system's states under different levels of attacks with varying system recovery abilities. Then, we use Colored Petri Net tools to simulate and measure the...
This paper analyzes the processes of the mobile payment, and proposes that secure communication between user mobile terminal and mobile payment platform is the key element of the mobile payment system. Then it presents a TTP-based security mobile payment model and from the two aspects secure including authentication and information transmission it analyzes security policy of the model that can achieve...
Anonymous routing algorithm determines the performance and security of an anonymous communication system directly, which are two conflicting considerable factors for the practicality of the whole system. Most of existing anonymous routing algorithms care little about the tradeoff between performance and anonymity. Some algorithms aim to achieve better performance, while others aim to acquire higher...
A threat situation analytical method based on the network graph theory model was presented. In this method, the attack cost of adjacent nodes and the calculating formula for its effectiveness value were defined, as well as the method to calculate the maximum threat path and node. It analysis the threat level of the target node and the threat path of a local area network. The results indicated that:...
This paper describes an attempt to identify the relationships between the using of a mobile device and an online shopper's trust in use of electronic payment systems in order to see how the adoption of a mobile device can contributes positively to increase shoppers' trust in their used of electronic payment systems. Therefore, this trust will increase shopper's intention to purchase online. It also...
This paper first analyzes authentication and key agreement protocol adopted by 3rd generation partnership project (3GPP) system architecture evolution (SAE) release 8 standard, and points out the security problems solved and not solved in contrast with third generation wireless communications. Then we focus on several security defects in the protocol, and based on public key cryptosystem, puts forward...
The primary goal of the secure socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server's RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to speedup SSL session initialization. The optimization strategy, which is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.