The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to CISCO 2016 Annual Report Security, firewalls are the most commonly used security tools by enterprises (65 percent) in the use of security defenses versus different threading's. In the scope of Information technologies, threads have been evolved and have diversified. However, and for this reason, is important detect and identify them, preventing anomalous behavior on networks. New methods...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
Many wireless systems used by military ground personnel are satellite based. This paper explores a hybrid system that benefits from both satellite and terrestrial wireless technologies while overcoming the limitations of each. We present the architecture, describe the merits, and then explain the essence of the system: IP Flow mobility. After introducing this concept, we describe some of the important...
Wireless communication networks, mobile communication terminals and other aspects of multiple factors are threatening the security of Mobile E-Commerce. In order to protect the security of Mobile E-Commerce, security technology system based on WAP should be constructed and secure payment solutions'support is needed.
The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP was noticed at packet size 1408 bytes where IPv4 provided 31.48 Mbps and IPv6 provided 24.33 Mbps higher throughput in the open environment. The performance of IPv4 and IPv6 are...
Wi-Fi hotspots deployed by domestic networks are an attractive approach to foster ubiquitous Internet access for mobile computers. However, it raises several security issues, since the owners of such hotspots cannot be trusted to be honest; therefore, visitors should consider them as potential Man-in-the-Middle attackers. On the other hand, the owners of such hotspots should not be legally accounted...
Residential Network is an inter-connection of several electrical and electronic home appliances for convenient, comfortable and daily life of home users. It is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home with various home network services regardless of device, time and place. More and more devices will be wireless and most of them...
In this paper, we present a man-in-the-middle attack on 3G-WLAN internetworking, one of the widely used technologies in real-world deployment. Since 3G runs CS (Circuit Switch) in many practice and WLAN runs PS (Packet Switch), a gateway is necessary to perform protocol transforming to achieve internetworking of 3G and WLAN. However, the 3G-WLAN gateway is frangible to the kernel upgrade attack which...
The wireless local area network (WLAN) technology has a rapid development because its advantages of fast and high-efficient, flexible and easy in net building. Wireless network brings users convenient network service, but it also hides many security problems that hinder WLAN's development. This paper combines the accountability of IP address with trust routing to a second mechanism applied in WLAN...
In this paper, Mosul University Wireless Local Area Network (MUWLAN) security will be evaluated. The evaluation was made to test the confidentiality, integrity and availability of the MUWLAN. Addressing these issues will help in ensuring tighter security. After the evaluation, serious security pitfalls were found that can allow any attacker to have access to the MUWLAN and uses their internet service...
The impact of WPA2 security on performance of IPv4 and IPv6 on two client-server wireless 802.1 In networks implementing Windows Vista-Windows Server 2008 and Windows XP -Windows Server 2008 is investigated. Results indicated that for XP enabling WPA2 results in an average of approximately 7.07% less throughput than open systems for IPv4 and 5.42% less throughput for IPv6. Enabling WPA2 on Vista results...
IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast streams using Wi-Fi networks. However, multicast over Wi-Fi suffers from several well-known problems such as low data rate, high losses and unfairness vis-a-vis other contending unicast transmissions. In this paper we present DirCast,...
With the rapid development of wireless communication, it is an inevitable trend that WLAN as a wireless access mode will integrate with 3GPP system and form the interworking network. How to realize the fast and authentic handover scheme of WLAN-3GPP interworking network becomes one of the focus issues in this field. In view of the weaknesses of existing handover schemes, this paper proposes an improved...
The IP multimedia subsystem is a basis for a significant new architecture which offers network operators the opportunity to expand their services, integrating voice and multimedia communications and delivering them into new environments with new purposes. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. Using IMS bears several new security challenges. In...
The integration of IP-based and cellular network has lead to increased demand on Internet applications. Wi-Fi handsets that are capable of voice over Internet protocol (VoIP) services and that can switch seamlessly between IP-based and Cellular networks are subjected to continuous security threats that prompt the need for security mechanism. In this paper a solution for a secured VoIP service in this...
A research on the related technology and implementation of IP phone based on WiFi network is discussed in this paper; it includes the net structure of the technology used in designing the terminal of IP phone. This technology is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. A WiFi enabled IP phone is used which is preinstalled...
To support healthcare organizations responses, many companies have started solutions to be satisfied the specific requirements of healthcare programs, and plans. This paper presents a designed and implemented care system for health diagnosis based on GPS location in the hospital. The designed handheld care system is implemented using an embedded Visual C++4.0 and Pocket PC2003 software development...
This paper presents an ad hoc based secure architecture for survivable and reliable substation automation system (SAS). Various security attacks with existing routing protocols are presented and a new secure wireless routing protocol is proposed to identify malicious and unauthorized nodes and counter these attacks on substation automation systems networks. Performance of the proposed protocol is...
Contrast with the current WLAN (wireless local area network) security mechanism worked in data link layer. IPSec over WLAN worked in IP layer has his superiorities. But as a security mode originally used in wired network, IPSec uses IKE (Internet key exchange protocol) as default that need a large number of computation is not fit for mobile devices of WLAN. Besides, IPSec protocol does not fit mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.