The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SABSA has been widely adopted as a framework for developing security architectures which reflect real business needs, and providing an end-to-end context for security policies and standards. In this paper we describe how we bring together the appropriate parts of the Survivable Network Assessment methodology and probabilistic risk assessment of the survivability of critical infrastructure systems...
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Wireless sensor networks are promising future of many sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended which causes serious security concerns. Insecure wireless communication...
In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing stakeholders with quantifiable evidences that...
The transformational satellite communications system (TSAT) is the DoDpsilas next generation geosynchronous satellite communications constellation. The TSAT system features packet and circuit interfaces that support a wide variety of military missions by providing communication services to fixed ground, mobile ground, marine, and airborne terminals. These terminals access a variety of link rates and...
As the number of security system to be managed grows, the task of managing these security systems depend on numerous system and vendor specific issue. To prevent the managers from drowning in complicated detail, the managerpsilas policy of conceptual level needs to be translated to low-level policy which systems understand. Polices which are derived from the goal of management define the desired behavior...
For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficult and expensive to achieve. This is not only because adversaries may attack against sensor source privacy through traffic analysis, but also because sensor networks are very limited in resources. As such, a practical tradeoff...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.