The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
The provision of NEMO support based on an end-to-end protocol presents manageability challenges that are usually overcome delegating the signaling rights to the MR. In addition, whether the protocol is focused on establishing security associations, how these are rekeyed through a proxy-based process with no security threats should be solved. In this work we focus on the HIP protocol and analyze existing...
Host Identity Protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Yet micro-mobility has not been efficiently and securely addressed by HIP and other mechanisms based on it. This paper introduces a method based on HIP to support micro-mobility in an efficient and secure manner. We present the architectural elements...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
IP spoofing exacerbates many security threats, and reducing it would greatly enhance Internet security. Seven defenses that filter spoofed traffic have been proposed to date; three are designed for end-network deployment, while four assume some collaboration with core routers for packet marking or filtering. Because each defense has been evaluated in a unique setting, the following important questions...
Gaining a better knowledge of one's own network is crucial to effectively manage and secure today's large, diverse campus and enterprise networks. Because of the large number of IP addresses (or hosts) and the prevalent use of dynamic IP addresses, profiling and tracking individual hosts within such large networks may not be effective nor scalable. In this paper, we develop a novel methodology for...
A number of green technologies such as Smart Power Grids, Smart Buildings, Smart Industrial Process and Smart Transportation rely on sensor technology. Sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most efficient manner. However, a significant challenge in the practical application of sensor networks is the need for...
Vehicle chatting is one of the most promising applications in VANETs, which allows like-minded vehicles to chat on the topics of common interest on the road. However, there exist some newly emerging privacy challenging issues in vehicle chatting application, such as how to find a like-minded vehicle on the road and how to prevent one's interest privacy (IP) from others who are not like-minded? In...
Host-based mobility and multi-homing protocols allow hosts to change their location or network interface during ongoing sessions in a cost-efficient, technology-agnostic manner. Since these solutions enjoy resurgence with the rise in mobile internet traffic, they are faced with the problem of providing sufficient security without impairing the economical benefits. We present a lightweight security...
In mobile ad hoc networks, the security enforcement and its implementation becoming increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication devices), no fixed network topology and more importantly absence of centralized authority. In such networks, communication links between nodes may be bandwidth constrained, messages typically roamed in multi-hoped fashion,...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP...
Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in Virtual Ad hoc Network (VAN) testbeds that can imitate a tactical MANET to a high level of fidelity. For applications, this is achieved by executing unmodified software...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
This paper forward a method for making FMIPv6 security and fast handover based on the context transfer protocol. The context transfer protocol realizes foreign network certificates the mobile node MN rapidly and safely without home network participating. Besides, during the transferring period, the paper adopts ECC mechanism to keep the context safe and reliable. At the end of the paper, this method...
For TCP/IP Agreement has certain security bugs, the hacker catches the opportunity to attack the Network. On the basis of the analysis of the TCP/IP Agreement's vulnerability, the article has further analyzed the vulnerability of the Transport Layer Agreement, and discussed the security and the promotion method of TCP/IP Agreement's transport layer.
Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process...
The security of SCADA systems is one of the most pressing subjects in industrial systems, especially for those installation actively using the public network in order to provide new features and services. In this paper we present an innovative approach to the design of Filtering Systems based on the state analysis of the system being monitored. The aim is to detect attacks composed of a set of “SCADA”...
We propose a scheme for secure information networking on RFID system. We investigate a study on network agent function to give IP address at RFID tag and present a mechanism for secure information transmission.
It is important for us to determine the source of the Attack, when we want to defend against the malicious actions, such as (D)DoS. Log-based technology is to log the packets information, which can mean how the packets traverse the network. Source Path Isolation Engine (SPIE) is a great development in log-based technology, but it still has some shortages. In this paper, we proposed a collaborative...
Content audit analyzes the messages of application layer communication between the peers, and matches the set security policies to ensure legitimate and effective use of network resources. The link management is one of the key issues in designing the content audit system. In order to achieve efficient management of TCP links and the correlation analysis of the same session, the hash list is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.