The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security...
Today, the emerging new services like Voice over IP (VoIP) and Video on Demand (VoD) require Quality of Service (QoS) guarantee. These services can be accessed using wireless technologies such as Wi-Fi or WiMax which may make the concerned communications vulnerable to security attacks because of the open medium on which these access technologies are based. Thus, security level must also be guaranteed...
Home network is required for installment, simple & convenient use, expensive cost, various application service. Security is essential requirement for the interlock of intranet and extranet. To control home network by outside user terminal, this paper proposes that the outside client connects home server using SOAP (Simple Object Access Protocol) message. Based on x.509 v3, the proposed system...
IEEE 802.11 wireless local area networks provide the ability to build a cost efficient network infrastructure that is flexible and mobile. This technology tried to provide mechanisms by which to secure the network, however, it failed to do so. The security mechanisms evolved from wired equivalent privacy (WEP) to Wi-Fi protected access (WPA), which introduced more enhancements to both encryption and...
Since Hopper and Blum suggested the HB protocol which is based on the conjectured hardness of the LPN (Learning Parity in the Presence of Noise) problem in 2001, a family of light-weight authentication protocols has been developed for RFID (Radio Frequency Identification) system by many engineers. It was found that each algorithm had own weakness against new attacks so that more advanced protocols...
Radio Frequency IDentiflcation (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. However,...
The paper deals with the area of user authentication. This service is fundamental for present networks and their security so we start with modern AAA (Authentication, Authorization and Accounting) protocol analysis. As a result of current state and protocol analysis we identify main problems in the field of user authentication - insufficient flexibility and therefore lack of security. These properties...
Decentralized node admission is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology as well as to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted authority. An ideal admission technique must involve...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
Trusted Computing Technology provides powerful support for the solution to security issues of embedded endpoints in network computing environment. In this paper a general framework of trusted access, which is for implementation on embedded trusted endpoints, is presented. The paper describes the authentication procedure of trusted access and its formal definition, and the design and implementation...
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy...
The system proposed in this thesis allows acquiring security by using two dimensional array technique to enhance the security of the existing RFID system. The proposed system uses the value of UID which is an original ID value of RFID Tag and two dimensional array to authenticate between the tag and the reader. In order to code/decode in the proposed system, it uses the key set defined by the manager...
Peyravian and Jeffries have proposed DH based protocol to perform remote user authentication and password change in a secure manner. But these protocols suffer from off-line password-guessing attack and Denial-of-Service attack. In this paper, we proposed secure password-based protocols for remote user authentication, password change, and session key establishment over insecure networks.
IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control, in which the Privacy and Key Management (PKM) protocols are specified. This paper models the PKM protocols using Casper and analyzes the CSP output with FDR, which are formal analysis tools based on the model checker. Later versions of PKM protocols...
The paper analyzes the security of IEEE 802.11. Based on the discussion of IEEE 802.11 security requirement, the three security technologies-SSID (Service Set Identifier), MAC(Media Access Control), WEP(Wired Equivalent Privacy) in WLAN standard IEEE802.11 are introduced, especially the encrypting algorithm and the integrity check algorithm in WEP. The security flaws caused by RC4 algorithm, key management,...
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security policy should be checked. Only the one that meets the security policy will be allowed to access to the network. Meanwhile, the one that does not meet the security policy will be isolated....
Many researches about Binding between Mobile IPv6 techniques and Wireless MAC are ongoing. But, Studies related to security hardly ever are conducted. In paper last time, we proposed Optimized Cryptographic Binding Protocol (OCBP)[2]. OCBP that bind between IEEE 802.16e Security Protocol (PKMv2 EAP method) [1] and MIPv6 AAA bootstrapping authentication procedure [15][17] supports more efficient authentication/Key...
With the broad application of UNIX and its descendants in recent years, heterogeneous network environment is a must to maximize the enterprise's freedom of choice. However, because of different accounts formats and authentication mechanisms of various operating system (OS), heterogeneous network environment also increases difficulties for system management and security implementation. Facing the situation,...
In this paper, we propose a new lightweight authenticated encryption mechanism based on Rabbit stream cipher referred to as Rabbit-MAC, for wireless sensor networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed scheme provides data authentication, confidentiality and integrity in WSNs. We construct a Rabbit based MAC function, which can be used for data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.