The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine-to-machine communications is characterized by involving a large number of intelligent machines sharing information and making collaborative decisions without direct human intervention. Due to its potential to support a large number of ubiquitous characteristics and achieving better cost efficiency, M2M communications has quickly become a market-changing force for a wide variety of real-time...
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
The advances of network technology bring many more kinds of network form, such as SDH network, PON network, video network, power network and so on. On the one hand it leads to the network complication and on the other hand also puts forward higher requirement on business network management system. Database-centric network management would improve network security and reliability; provide effective,...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
A lot of efforts have been devoted to the analysis of network protocol specification for reliability and security properties using formal techniques. However, faults can also be introduced during system implementation; it is indispensable to detect protocol implementation flaws, yet due to the black-box nature of protocol implementation and the unavailability of protocol specification most of the...
Network monitoring is a basic component for intrusion detection and also an energy-expensive task. However in the existing works the contradiction between energy efficiency and security of network monitoring isnpsilat well handled. In this paper, we propose SpyMon, a network monitoring mechanism for the sensor network. To achieve energy-efficiency and reliability, a subset of sensor nodes are randomly...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
This paper proposes a new approach of modeling the collaboration of sensor system artifacts to address the security and survivability concerns of sensor networks. The model considered is composed of sensors, base and users. Sensors are nodes that acquire and process data. Base is the node that acquires and processes data from sensors and provides an interface to access and monitor the sensor network...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.