The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data aggregation is a necessary choice of the resource-restricted wireless sensor networks, security-sensible projects in wireless sensor networks are easily threaten by fabricating or tampering data out of nodes during data aggregation. To guarantee the authenticity and reliability of data resulting from aggregation, a secure model of data aggregation for wireless sensor networks is built based on...
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanisms cannot meet the security requirements of MANET due to the limited communication bandwidth, computation power, memory and battery capacity, and dynamic deployment environment. Many...
In this paper we evaluate the influence of the network topological characteristics on the extent of losses after attacks. For that purpose, we use the ATRF (attack-to-random failure) multiplier. Modeling results show that when using a standard metrics of distance in path computations, the number of connections broken due to attacks on irregular networks is significantly greater, compared to random...
Survivability becomes an important issue in optical networks due to the huge bandwidth offered by optical technology. Many works have studied network survivability. The majority of these works are typically destined to single-domain. In this work we address the survivability in multidomain optical networks. This paper provides a classification of the existing protection solutions proposed for multi-domain...
There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security...
Facing the security threats and the energy shortage, a multi-angle trust mechanism for nodes in wireless sensor networks was proposed, which extended the previous trust model only base on communication trust. With adding the sensing data and the node's energy in the factors of trust assessment, and new trust models to calculate the trust values of the sensed data and the node's energy, a more reliable...
For communication between the cluster head node (CHN) and the distant data fusion center (DFC) with the cooperation of intra-cluster nodes in wireless sensor networks (WSNs), reliable handling of packets by the cooperative node (CN) is difficult to ensure. In this paper, we propose a novel CN selection scheme based on trust for WSNs. This scheme can choose one of high trust nodes to assist in the...
Self-healing key distribution schemes enable a group user to recover session keys from two broadcast messages it received before and after those sessions, even if broadcast messages for middle sessions are lost due to network failure. These schemes are quite suitable for supporting secure communication over unreliable networks such as sensor networks and ad hoc networks. An efficient self-healing...
Survivability of network system is a very important issue in security field. Based on analyzing existing methods and defining the system attributes about survivability evaluation, the paper adopts stochastic Petri net (SPN) to analyze the survivability characteristics of the telecommunication switching system. The performance and fault-repair models are depicted by SPN and the quantitative evaluation...
The aim of the paper is to design a reliable policy oriented security functional framework for network computing environment. Generally it is difficult to define reliable security policy components that should be applied to validate secure network computing environment. Therefore, we have decided to prepare the interpretation of security functional requirements that are defined in the ISO/IEC 15408...
Survivability has emerged as a new phase for the development of network security technique, and how to improve the system survivability using effective technique is an important problem. This paper takes the requirement of emergency response as its research background, and a new algorithm is proposed based on resource reconfiguration. The algorithm focuses on the time of emergency response and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.