The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With increasing deployments of smart grid systems, a large quantity of energy usage and grid status data have been collected by smart grid devices like smart meters. To secure these critical and sensitive data, it is crucial to prevent unauthorized readings from these devices. Many authentication protocols have been proposed to control access to smart grid devices that are a part of the smart grid...
To provide secure data transmission in Cluster Wireless Sensor Networks (CWSNs), the challenging task is to provide an efficient key management technique. To enhance the performance of sensor networks, clustering approach is used. Wireless Sensor Network (WSN) comprises of large collection of sensors having different hardware configurations and functionalities. Due to limited storage space and battery...
With the wide application of the network and the rapid expansion of its scale, the types of network devices deployed in one network are getting more and more as well. Each kind of devices has its own management method, so there is an urgent need for a unified network device management system. This paper designs an extensible network device management system, which is able to manage multi-type network...
Today's network is switching towards the world of ubiquitous computing. Since the technology follows you at your finger tip and practical orientation of these ubiquitous services needs three main criteria. Firstly, WAN for internet cloud; secondly, remote servers using LAN and WLAN and finally with personal area ubiquitous network called HAN (IEEE 802.15.6). Since the data transmission is ease due...
The unique characteristics and parameters of Cognitive Radio Networks (CRNs) present several possible threats such as selfish misbehaviours, primary user emulation and attacks on spectrum managers. A secure MAC protocol is required to maintain the CRNs and operate against the possible threats. This paper is a second generation of the Secure MAC protocol for CRNs (SMCRN) to address the security requirements...
With wide deployments of Smart Grid systems, a large amount of energy usage and grid status data have been collected by smart meters. To secure those critical and sensitive data, it is crucial to prevent unauthorized readings to smart meters. Many authentication protocols have been proposed to control the access to the smart meters that are a part of Smart Grid data communication network, but authentication...
It is widely recognized that wireless sensors are not only resource constrained but are vulnerable to outsider and insider attacks. As such wireless sensor networks (WSNs) have to be designed using low energy wireless sensor devices as well be implemented with due consideration for the security of the network. In a previous work, we have identified IBE as one of the most suitable protocol for WSN...
The encryption standards such as DES (Data Encryption Standard), AES(Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel' [10]. Network security threat is an onerous issue that has captured lot of attention in recent times. Data transmissions between computers in a network employ different protocols and...
Machine type communication (MTC) is becoming an important part of the cellular network, such as long-term-evolution (LTE) network. Diverse MTC applications are going to be realized in LTE network due to the advantages of better coverage and lower deployment cost. However, a large number of MTC devices desiring to transmit short data will cause overloaded in the radio access network (RAN). As a solution,...
3G/UMTS-WLAN heterogeneous mobile network is a complementary platform for the trend of Beyond-3G (B3G) wireless data communications. However, the design of a securing authentication protocol in 3G/UMTS-WLAN heterogeneous mobile networks is a challenging task. Even though EAP authentication and key agreement protocol (EAP-AKA) is adopted by 3rd generation partnership protocol (3GPP) to achieve authentication...
This paper deals with the problem of securing data transmission in home and building networks, discussing a solution to introduce both confidentiality and authentication, based on classical security mechanism and algorithms. To validate the approach the authors applied the proposed techniques to KNX, the European and international standard for home and building automation, which doesn't provide for...
This paper introduces a mechanism - UDT-Authentication Option (AO) to secure UDT -a new UDP-based data transport protocol. We describe this mechanism through the introduction of UDT extension to achieve security. We evaluate UDT-AO through the use of existing message authenticity for other protocols such as TCP. We review existing message protection that can act like a signature for UDT segment incorporating...
IP based communications are becoming more and more ubiquitous and hence the need for reliable and faster algorithms that can provide authentication, confidentiality and integrity. However, not much attention is paid to large volume data communications such as VoIP, IPTV, IP Multimedia Subsystems (IMS), etc. Large volume data communications require simple, easy to implement and extremely fast algorithms...
In this paper, a system for PPPoE protocol analysis is designed and implemented. The system includes three modules: network capture module, traffic analysis module and information log module. The network packets are captured by Winpcap which can enhance high correctness and efficiency of the network capture. The mechanism of PPPoE data communication and the packet capture method of using Winpcap are...
As we know, the communication networks were first designed for voice communication purposes. Further developments within the communication networks made it possible to send or transmit data as well. When the public network is used as a bearer for data which need high security, e.g. payment, shopping, police telecommunication or mobile betting, there is a possibility that an attacker might capture...
e-Health services are gaining popularity due to largely reduced cost and wider range of advanced services. Securing e-health data transmission is challenging due to both (a) the criticality of personal medical information on effective medical treatment and privacy protection and (b) the significant computational needs of encryption algorithms. In this paper, a cost-effective security framework that...
With the analysis of IPv6's IPSec protocol and principles, the paper designs various modules of IPSec, and achieves IPSec function. By the analysis of the FTP under IPv4 and IPv6 environment, the paper realizes the function of FTP in data transmission of IPv6. The test results of FTP data transmission based on IPSec show that the data transmission is successful and secure, the design and realization...
Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable...
Wireless sensor networks attract applications ranging from border security to commercial market, and demand efficient security solution par application requirements. This paper presents a password-based authenticated key agreement protocol that allows mutual authentication and secure data transmission between sensor network and user. The protocol is well-suited in the resource-constrained sensor nodes,...
Node join authentication and pair-wise key establishment are essential services to provide confidentiality and authentication to the data communication between any two nodes in a network. Since wireless sensor networks are equipped with resource constrained nodes and therefore energy efficient protocol design is required to provide long network life, we have made an analysis of communication overhead...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.