The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of users of mobile devices has increased enormously over the past five years. Along with this, the public concern about how to make sure personal information remains private and safe has also grown, and it has become a high priority standard for mobile device producers to fulfill. Programming languages, by themselves, offer a limited safely, unfortunately. A common example is the use of...
The open medium, dynamic topology, and multi-hop cooperative routing of vehicular ad hoc networks (VANETs) make it facing more security challenge than wired networks. In this paper, a hierarchical VANETs intrusion detection system based on BUSNet is present. BUSNet is basically a virtual mobile backbone infrastructure that is constructed using public buses. We use the bus nodes as the cluster-heads...
Security policy specification can be difficult to get right. Electronic systems often fail to provide an easy route to encode requirements that would be simple to enforce through controlling how physical principals interact. This paper presents a means to ameliorate potential policy mismatches through the use of location awareness systems allowing changes in the physical world to be mapped to electronic...
In dynamic networks such as MANETs and p2p, trust is an important ingredient. Traditional trust models based on reputation can restrain some ordinary behaviors of malicious nodes and avoid them abusing of resources. However, it suffers a lot from dishonest feedbacks and strategically cheating behaviors of malicious peers. According to the behavior similarity rule of the human society and the definition...
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important...
A wireless sensor network is a network of distributed sensor nodes each equipped with its own sensors, computational resources and transceivers. These sensors are designed to be able to sense specific phenomenon over a large geographic area and communicate this information to the user. In this work a novel approach to tracking dynamic targets in a sensor field is presented. Using a combination of...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.