The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The provision of NEMO support based on an end-to-end protocol presents manageability challenges that are usually overcome delegating the signaling rights to the MR. In addition, whether the protocol is focused on establishing security associations, how these are rekeyed through a proxy-based process with no security threats should be solved. In this work we focus on the HIP protocol and analyze existing...
Gaining a better knowledge of one's own network is crucial to effectively manage and secure today's large, diverse campus and enterprise networks. Because of the large number of IP addresses (or hosts) and the prevalent use of dynamic IP addresses, profiling and tracking individual hosts within such large networks may not be effective nor scalable. In this paper, we develop a novel methodology for...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors, however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
This paper proposes a wireless network security evaluation method based on Fuzzy-AHP (Analytic Hierarchy Process) with variable weight. In this paper, we first design the evaluation index system based on characteristics of wireless networks, and then analyze each uncertainty measured by the Fuzzy-AHP method, and introduce variable weight theory into Fuzzy-AHP method to address the difficulty of weight...
Trust models studied before evaluated trust degree by the previous interactions of entities in ad hoc networks within a protocol. However, this way is not accurate and difficult to decide the trust value. The basic difficulty lies in the fact that trust information is often fuzzy and incomplete in an open network environment. The performance of mobile ad hoc network also is constrained by residual...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors; however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
In order to build large-scale RFID applications, it is necessary to establish public RFID service infrastructure, the essential task is to build efficient and secure RFID code resolution network. Aiming at alleviating the problems in load balancing, single node failure tolerance and security of resolution network, based on related standards and research works, a hierarchical P2P based RFID code resolution...
In mobile ad hoc networks (MANETs), hierarchical key management structure has some distinct features and becomes popular in many applications. In a MANET where security requirement is high, node states should be considered when constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated from optimally...
The core of fuzzy evaluation on campus network security is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
In wireless sensor networks, sensor nodes eventually die due to battery depletion. Wireless sensor networks (WSNs) in which new nodes are periodically redeployed with certain intervals, called generations, to replace the dead nodes are called multi-phase wireless sensor networks. In the literature, there are several key predistribution schemes proposed for secure operation of WSNs. However, these...
Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the resource-constrained wireless sensor nodes. Several key pre-distribution schemes have been proposed in literature to establish pairwise key between sensor nodes, but most of which only...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
Internet Security mechanism of itself is more vulnerable. While coupled with the inherent openness of wireless network media and the limitations of mobile storage and computing resources in the wireless network environment, it does not only have to be encountered with the security threats in the cable network environment but also the emerging wireless-specific threats to the wireless environment....
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
Network security situation is a hot research realm in the area of network security, which helps security analysts to solve the challenges they encounter. This paper presents the evaluation index, and the characteristic attributes to describe the state of network situation, discusses the grey model includes grey correlation model and grey forecast algorithm to get the evaluation index and predication...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
Through mathematical analysis, the primary components analysis (PCA) is used to analyze the effect of influential factors on campus network security (CNS). Based on PCA model and, the results are computed. Through case study, it can be seen that some factors and characteristics play very important role in influencing CNS and all factors should be considered because the effect depends on the factors...
This paper proposes a novel lightweight mechanism for a secure physical (PHY) layer in cognitive radio network (CRN) using orthogonal frequency division multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on...
Sensor networks will play a key role in future smart environments. Sensor nodes which are used to form wireless sensor networks, are limited energy resources and have low power capabilities. Thus, sensor networks need to be energy efficient. When they are deployed in military environments, they also need strong security services. In this paper, an improved energy-efficient security scheme is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.