The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper...
The following topics are dealt with: cognitive radio; future internet research; service management; networking; source coding; network service; cooperative communication; wireless ad hoc networks; mesh networks; cryptography; ethernet; passive optical networks; MIMO systems; OFDM; OFDMA; elasticity; LDPC coding; wireless sensor networks; quality of service; random access; protocols; optical networks;...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message authentication...
Wireless mesh networks (WMNs) have emerged as a promising technology that offers low-cost community wireless services. Security is critical for the deployment of these services. Previous work focused primarily on MAC and routing protocol security, while application-level security has received relatively little attention. In this paper we focus on providing data confidentiality for group communications...
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.