The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid Information Service (GIS) is an entity that gathers the latest information about the grid resources. These resources information are then retrieved by the grid users or brokers prior to planning task deployment in a grid environment. Hence, the GIS frequently communicate with the resources for their latest status, and hardware and software specifications. This creates the need for timely and...
The success and efficiency of managing an emergency situation (such as rescue operation, fire fighting etc.) depends on enabling a system that would ensure the timely availability of high-quality and latest information to the emergency Mobile Units (MU). The system must ensure the provisioning of relevant information in a secure manner irrespective of the location and/or mobility of the MU. The enabling...
Many e-commerce applications are prevalent in today's world. New features and enhanced security, both are required for successful launch and deployment of e-commerce applications. In this paper, we focus on a generic e-commerce architecture, called eTRON which incorporates - at its nucleus - the tamper-resistant eTRON chip, equipped with functions for mutual authentication, secure communication, and...
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. This paper presents an authenticated...
Nowadays, short message service (SMS) is faced with various security threats. Thus, the fields of high confidentiality(e.g., mobile E-commerce) require a higher level of security protection on SMS. Secure communication in incredible mobile network has very important significance. This paper presents a high security communication protocol for SMS. Through authentication, decryption and integrity protection,...
Secure communication of the location information or localization of sensor nodes in an adversarial environment is a high priority yet a challenging task. Wireless sensor networks are characterized by severe constraints such as memory, energy, processing and operational environment. Unlike other wireless networks, a sensor network has to be highly sensitive to energy consumption. Complexity and power...
It is the fact that wireless networks have become one of the most widely used communication systems in the world due to the wireless network's natures. However, at the same time providing secure communication for wireless networks has become one of the prime concerns. There are many ways to improve security issues, one of them, titled quantum cryptography, namely quantum key distribution (QKD), offers...
To secure communication in Grids many efforts have been made regarding authentication and authorization. Due to some application requirements it is up to now recommended to open wide port ranges on firewalls. This configuration is commonly accepted as insecure. We present an approach to enhance the security of firewalled Grid components by a new method to dynamically authorize TCP connections on firewalls...
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating...
It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous...
Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. Due to their significance in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings. Among these is the so-called S-3PAKE protocol proposed by Lu and Cao for password-authenticated...
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these applications is to facilitate dynamic information sharing and analysis, thereby creating a more integrated and convenient experience for end-users. As mashups evolve into portals designed to offer convenient access to information...
Today more then ever, secure communication is a must. Most companies now user network infrastructure to conduct their business, whether internally (intranet model) or externally to reach partners or customers (extranet/Internet models). While it is utopian to consider today's networks as being safe, there are solutions to make them more secure and use them with a bit of trust. The key aspects to securing...
With the advances in smart card technology it is quite possible to support more than one type of subscriber identity applications on the same smart card. We propose an architecture capable of hosting multi faceted subscriber identity applications which exploits common functions and data in a secure partitioned manner. The associated security mechanisms are also defined in order to realise its implementation...
This is an era of wireless (mobile) communication and computing where mobile devices such as personal digital assistants, smartphones, etc., are being used in place of traditional computers. To secure wireless communication many services and protocols have been developed such as IPSec, SSL/TLS, etc. Heavy computations such as generating RSA keys (large prime numbers) are difficult to generate on mobile...
Anycast is a communication mode in which the same address is assigned to a group of servers and a request sent for a service is routed to the 'best" server. Because the group management and the routing protocol in the anycast are not so mature, there are distinct and significant security vulnerabilities in both the anycast model including denial of service, theft of service, eavesdropping, and...
Because group management protocol and routing protocol of anycast are not so mature, when communicating it is easy to be attacked by malicious programs such as masquerading and denial of service, etc. Aiming at security of anycast, we propose a new secure anycast group management architecture based on others' research in this paper. We setup a Certificate Authentication Server in the group management;...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
This paper focuses on the security of the Athens wireless metropolitan network (AWMN), which is an established autonomous network. More specifically, it presents and analyzes the possible security attacks that threaten AWMN, its users and the provided services. Attempting to counteract these attacks and the related risks, we study and evaluate the application of known security measures in AWMN that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.