The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes the inclusion of two traffic forecasting frameworks in traffic sampling paradigm. The proposed frameworks: namely, the pattern forecasting and the attack forecasting, predicts the occurrence of traffic deviation and examines the existence of malicious attack in the traffic deviation, respectively. While the former utilizes the ARAR model to forecast the network traffic, the latter...
The distributed hosts in the Internet are organized into a P2P network by chord protocol for detection. The detection node uses the CUSUMpsilas sensitivity to the slight change to detect the change in the amount of packets to destination address. Upon the abnormality detected, it is broadcast based on the node trust. The response nodes use space similarity algorithm to calculate the similarity between...
In wireless sensor networks (WSNs), key management is one of the crucial aspects of security. Although existing key management schemes are enough to solve most of the security constraints on WSNs, a random-key predistribution scheme has recently evolved as an efficient solution for sharing keys between sensor nodes. Studying the signal ranges of the sensor nodes might significantly improve the performance...
The cross-regional transitivity problem of key leak exits in the most key management protocols. It's harmful to the security of system. CUT, a new key management protocol in WSN is presented. The results of simulation show CUT can solve the cross-regional transitivity problem of key leak and is scalable.
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.