The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine-to-machine communications is characterized by involving a large number of intelligent machines sharing information and making collaborative decisions without direct human intervention. Due to its potential to support a large number of ubiquitous characteristics and achieving better cost efficiency, M2M communications has quickly become a market-changing force for a wide variety of real-time...
A centralized impairment-aware lightpath restoration scheme is experimentally demonstrated. Through the implementation of the QoT estimator module on FPGA technology, restoration times of 1.36 s are achieved for the high priority traffic class.
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
Network traffic anomaly detection is an important component in network security and management domains which can help to improve availability and reliability of networks. This paper proposes a flow-based anomaly detection method with the help of entropy. Using IPFIX, flow records containing multiple traffic features are collected in each time window. With entropy, joint probability space for multiple...
Key management is one of the most important issues of any secure communication. With the increasing demand for the transmission security in wireless sensor networks (WSNs), it is urgent to introduce the secure and reliable key management scheme into the WSNs. In this paper, we proposed a hierarchical key management scheme to ensure the security of the network services and applications in WSNs. Comparing...
With the rapid development of computer communication and web technology, especially the widely application of wireless sensor and embedded technology, Wireless Sensor Networks (WSNs) have been paid great attention in industry field and our daily life. WSNs based on ARM7TDMI-S CPU and ZigBee device has merit of rapid and simple in networking, node movable in application, abundant information in acquisition,...
The desirable features of future optical high-capacity networks include higher stability, reconfigurability and security. In order to enable robust and self-managed automated operation, the network itself should be able to monitor the physical state of the network, automatically diagnose and repair the network, dynamically allocate resources, and redirect traffic. Optical performance monitoring can...
In this paper, we consider the reliable data fusion problem in a tactical environment in the presence of adversary. First, we characterize malicious behavior of compromised sensors assuming probabilistic models. Performance of the fusion process, in the presence of malicious sensors, is then quantified. The performance analysis shows that malicious sensors incur significant degradation on the fusion...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. However optical performance monitoring (OPM) and optical network management (ONM) are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems with transparency is the fact that optical crosstalk is additive, and...
Wireless sensor networks technology is a rapidly growing domain, getting more and more credit in the area of civilian and military applications. In the same time with technological advancement, new and dangerous information security threats have emerged. In this paper we considered that a node self-destruction procedure must be performed as a final stage in the sensor node lifecycle in order to assure...
Security and reliability issues are of utmost importance in transparent optical networks due to the extremely large fiber throughput. Fast and successful reaction and restoration mechanisms performed by failure management can prevent loss of large amounts of critical data, which can cause severe service disruption. In this article we discuss failure management issues in TONs, the mechanisms involved,...
The advances of network technology bring many more kinds of network form, such as SDH network, PON network, video network, power network and so on. On the one hand it leads to the network complication and on the other hand also puts forward higher requirement on business network management system. Database-centric network management would improve network security and reliability; provide effective,...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that...
Key management using threshold cryptography has proved its advantages by eliminating the dependence on an online central authority. However, some previous models are not suitable due to the inflexibility in dealing with keys. Moreover, solutions for those models are not complete; there are still vulnerabilities for attacks, especially DoS attacks. This paper will propose a more flexible modified key...
A lot of efforts have been devoted to the analysis of network protocol specification for reliability and security properties using formal techniques. However, faults can also be introduced during system implementation; it is indispensable to detect protocol implementation flaws, yet due to the black-box nature of protocol implementation and the unavailability of protocol specification most of the...
The Reliable Server Pooling (RSerPool) architecture is the IETFpsilas upcoming standard of a lightweight server redundancy and session failover framework for availability-critical applications. RSerPool combines the ideas from different research areas into a single, resource-efficient and unified architecture. Although there have already been a number of research papers on the pool management, load...
Network monitoring is a basic component for intrusion detection and also an energy-expensive task. However in the existing works the contradiction between energy efficiency and security of network monitoring isnpsilat well handled. In this paper, we propose SpyMon, a network monitoring mechanism for the sensor network. To achieve energy-efficiency and reliability, a subset of sensor nodes are randomly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.