The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy-harvesting techniques for low-power embedded devices are opening up new opportunities for the design and optimization of security protocols for Green Wireless Sensor Networks. In this paper, we focus on scenarios where the energy resources of nodes in the network are heterogeneous, and propose a network-level solution that leverages the heterogeneity of harvesting capabilities to reduce the...
The design of a cooperative protocol relying on both cooperative relaying and jamming in order to provide security at the physical layer of wireless communications is considered in this paper. We suppose that pair of nodes is assisted by a number of helpers in their communication, which either relay information or cause harmful interference to an eavesdropper, at both stages of the relaying protocol...
This paper presents a TCP/IP-based architecture (IPSecOPEP) to resolve the interoperability issue between PEPs (Performance Enhancing Proxies) and IPSec (Internet Protocol Security). Where this problem is due to the cryptographic protection of TCP header by IPSec ESP protocol, which prohibits TCP enhancing mechanisms to be performed by PEPs. The key idea of this solution is that IPSec devices can...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase the security and resilience of communication infrastructures. Despite their clear advantages, such solutions also expose ICS to common cyber threats that may have a dramatic impact on the functioning of critical infrastructures,...
Multi-tenant flexible, scalable and autonomic virtual networks isolation has long been a goal of the network research and industrial community. For today's Software-Defined Networking (SDN) platforms, providing cloud tenants requirements for scalability, elasticity, and transparency is far from straightforward. SDN programmers typically enforce strict and inflexible traffic isolation resorting to...
Enabling security over internet, firewalls play a major role. It checks all incoming or outgoing packet to decide whether to accept or discard the packet based on its policy. Firewall optimization focuses on either intra-firewall or inter-firewall optimization within one administrative domain where the privacy of firewall policies is not a concern. Explore interfirewall optimization across administrative...
In order to guarantee the privacy and safety of data transactions in Wireless Sensor Networks (WSNs), secure key transportation and unique node identification have become major concerns. WSNs are deployed in a wide range of applications with a high demand for secure communications. When designing a secure key management protocol for WSNs, special attention should be given to the resource constraints...
This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at relay nodes. For both decode-and-forward and...
Firewalls are widely deployed to safeguard the security of networks and it is critical for enterprise networks to have firewalls to prevent malicious attacks and to guarantee the normal functioning of the network. Firewalls prevent dangerous packets from entering the inner network by looking up the Access Control List (ACL) to permit or drop certain packets. However, ACLs often suffer from redundancy...
The growth of the Internet coupled with the complexity of the security needs increases the demands on filtering performance, so much so that it is crucial to maintain high classification throughput in a high speed environment. As a result, today's security devices require innovative designs and algorithms to optimize the efficiency of packet filtering systems. In this paper, we propose a safe and...
Firewalls are among the most important mechanisms used to enforce network security policies. However, It has been observed that most firewall policies on the Internet are poorly designed. A firewall error may allow the spread of malicious traffic or block legitimate one causing serious damages. A major source of firewall misconfigurations stem from the logically entangled nature of firewall filtering...
Long Term Evolution (LTE) prevails as the next 4th generation of mobile communications. Hybrid satellite and terrestrial LTE network takes advantages from the large satellite coverage for several emergency applications, such as providing civil security communications. In this paper we propose a LTE architecture partly composed of an integrated component with satellite backhaul on the LTE-S1 interface...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security...
In order to improve the stability, validity and reliability of network management, the management architecture of multi-agent network is analyzed, and the communication and language between the multi-agent are introduced. Finally, a Distributed Network Management Framework based on multi-agent is presented. The functions of each module and mutual cooperation process in the framework are outlined....
This paper minimizes the routing security risk while limiting the delivery ratio under an ideal value by 1) finding multiple paths between source and destination node; 2) employing the game theory to obtain the most reliability paths and further optimize shares allocation on these paths; 3) integrating secret sharing scheme, and achieving tradeoff between security risk and delivery ratio according...
This paper deals with an autonomous cognitive network management architecture which aims at achieving inter-network (horizontal) and inter-layer (vertical) cross-optimization. The proposed architecture is based on the so-called Cognitive Managers transparently embedded in properly selected network nodes. The core of each Cognitive Manager are the so-called thinking modules, which are in charge of...
In mobile IP, the home agent (HA) is an essential component. Mobile nodes will not function properly if the HA cannot be reached. Enhanced Route Optimization applies the Cryptographically Generated Home Address in the Mobile IPv6, to enhance the security and reduce the handoff delays. Unfortunately, it cannot provide home prefix validation. Communication with the Home Agent is still required to avoid...
We investigate the problem of optimizing the secrecy rate of a link between a single source and a single destination in the presence of multiple relays and multiple eavesdroppers. Multiple relays assist the source by either retransmitting a weighted version of the source signal in a decode-and-forward (DF) fashion, or by performing cooperative jamming (CJ) i.e., transmitting weighted noise in order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.