The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 802.11 Wireless Standard defines methods for improving reliability and security on Wireless Local Area Networks (WLANs). Two methods that are especially desirable to enterprise networks are handoff and Remote Authentication Dial-In User Service (RADIUS). Handoff allows seamless mobility on a wireless network, thus providing users with the ability to roam among enterprise wireless access points...
At present, the maturity of the peer-to-peer (P2P) research field has pushed through new problems such as those related with security. For that reason, it is important to provide security mechanisms to P2P systems since security is one of the key issues when evaluating them. The JXTA-Overlay project is an effort to use JXTA technology to cater to a generic set of functionalities that can be used by...
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible...
Researchers show that data aggregation could save energy and bandwidth of the networks. But the unreliability of wireless links will weaken the performance of network aggregation deeply. Based on homomorphic encryption technology and the non-repudiation transmission protocol, a novel approach to protect sensor data secure is proposed. Because of fully using symmetric encryption algorithm, the protocol...
The sensor networks is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many devices, called the sensor node, which have miniature computing device, small memory space and very limited battery power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between sensor...
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission...
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward a hierarchical trusted architecture for wireless sensor network, and establishes...
A wireless sensor network (WSN) is vulnerable to security attacks due to the broadcast nature of transmission and the limited computation and communication capabilities of the sensor nodes. Many key agreement schemes are developed to enable encryption and authentication among sensor nodes to protect confidentiality, integrity, and availability of the communications and computations of WSNs. It is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.