The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is...
The Kolona Gateway is a modular, cross-domain and multilevel security gateway capable of connecting the Global Information Grid (GIG) in a pluggable manner to civilian air traffic management authorities worldwide in a NextGen context. The Kolona On-Time System is a multipurpose container built to NextGen specifications as a framework for the Gateway application. The Kolona On-Time System is: 1. Capable...
In order to improve the efficiency of transmission for anti-virus gateway, this paper presents a new HTTP anti-virus gateway, which is called semi-proxy and based on protocol analysis. Based on the analysis of the principle of the current anti-virus gateway, this paper introduces the design principles and the key implementation techniques in detail, and finally verifies them by experiments. Experimental...
SCADA (supervisory control and data acquisition) systems control and monitor industrial and critical infrastructure functions, such as the electricity, gas, water, waste, railway and traffic. Recent attacks on SCADA systems highlight the need of a SCADA security testbed, which can be used to model real SCADA systems and study the effects of attacks on them. We propose the architecture of a modular...
For IPv6 and IPv4 network seamless interconnection question, it is very essential to study IPv4/IPv6 intercommunication technology to ensure smooth transition of IPv4 to IPv6. To solve the seamless interconnection question, this article mainly researches IPv4 to IPv6 development's intercommunication question of three stages, including IPv6 based-IPv4 network interconnection, IPv4/IPv6 transparent...
We propose a 6LoWPAN-SNMP that enables transmission of SNMP messages over IPv6-enabled low-power wireless personal area networks (6LoWPAN). The 6LoWPAN-SNMP is an extended modification of the Simple Network Management Protocol (SNMP). Compared to traditional IP-networks, 6LoWPAN is a severely resource-constrained network; hence, existing SNMP protocols need to be modified to meet the goals in RFC...
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our systems) are regarded as essential security methods, especially on the LAN system which uses ARP protocol with holes enabling hackers to conduct ARP spoof and sniff packets on the LAN systems. Regarding Web sites with membership systems such as e-commerce Web sites and...
The existing security systems show many shortcomings such as difficult to extend and severe time-consuming because it is based on wiring network technology. In this paper, we present a wireless networked security system based on ZigBee technology. The system adopts hybrid topology structure based on cluster, which consists of many micro-sensor nodes, network coordinator nodes, network gateway (router),...
This paper presents the security strategy used by WAP and I-Mode. It includes security transport protocol, the type of certificate, the performance of gateway, smartcard and authenticate scheme. It will first be illustrated from the architecture, and then discussed application situation. All of these schemes of WAP will be compared with the similar adopted technology of I-Mode. Through comparing,...
Ensuring that IP Security (IPSec) gateway meets its performance expectations is one of the most important objectives that IPSec gateway development team must face with. Only suitable validation approach may prove that IPSec gateway throughput is correct, Security Associationspsila adding/removing time is acceptable, IPSec gateway is capable of processing huge number of flows and IPSec rekeying works...
Proxy mobile IPv6 has been proposed to enable a network-based mobility support which does not require a mobile host to be involved in mobility signaling. In the Proxy mobile IPv6 specification, an authentication procedure is required as an initial part of registration for network access. However, the current specification does not provide the authentication procedure explicitly. Thus, in this paper,...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.