The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays security plays the major role in the network. Growing size of such proprietary networks creates increased opportunity for successful attack. Supervisory control and data-acquisition (SCADA) networks are more secure and vulnerable to attach from both internal and external intruders. It is the mechanism which is used to provide continuous monitoring and authentication to the network. Authentication...
The monitoring of oil and gas plants using sensors allows for greater insight into safety and operational performance. However, as a result of strict installation regulations of powered sensors near oil and gas fittings, the introduction of new wired sensors to optimize end-of-lifecycle plants has been expensive, complex and time consuming. Recent advances in wireless technology have enabled low-cost...
With the rapid development of wireless communication, it is an inevitable trend that WLAN as a wireless access mode will integrate with 3GPP system and form the interworking network. How to realize the fast and authentic handover scheme of WLAN-3GPP interworking network becomes one of the focus issues in this field. In view of the weaknesses of existing handover schemes, this paper proposes an improved...
Automated animal monitoring with energy efficient wireless devices mounted on the animals can improve efficiency of farming industry and increase its profitability by decreasing reliance on human labor. We discuss the practical deployment of delay tolerant store and forward cattle monitoring architecture that provides data retention, detecting custom events, notification issuing, remote and in-situ...
Bluetooth based new wireless applications can increase comfort and security by automation of the tasks earlier controlled manually. In this paper advantages of low cost, low power and robustness of Bluetooth have been exploited to propose and implement two new consumer systems in the form of a garage door opening system and an electronic attendance record system. Both the applications provide luxury...
Current Wi-Fi network infrastructure inherently lacks reliable positional knowledge of the origin of individual network packets. As a consequence, attackers are potentially able to impersonate legitimate Wi-Fi network nodes, including both clients and access points, by generating network traffic with all the characteristics of legitimate traffic. To exclusively discriminate illegitimate nodes, we...
Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide...
The existing security systems show many shortcomings such as difficult to extend and severe time-consuming because it is based on wiring network technology. In this paper, we present a wireless networked security system based on ZigBee technology. The system adopts hybrid topology structure based on cluster, which consists of many micro-sensor nodes, network coordinator nodes, network gateway (router),...
A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.