The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible...
Researchers show that data aggregation could save energy and bandwidth of the networks. But the unreliability of wireless links will weaken the performance of network aggregation deeply. Based on homomorphic encryption technology and the non-repudiation transmission protocol, a novel approach to protect sensor data secure is proposed. Because of fully using symmetric encryption algorithm, the protocol...
Wireless Industrial communications is emerging technology after the Fieldbus in industrial field. Since the industrial control application is needed in wireless industrial technologies, WIA-PA standard is defining the protocol suite, system management, gateway, and security for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting limited power consumption requirements...
Wireless sensor networks are used in many applications in military, ecological, health, and other areas. These applications often include the monitoring of sensitive information making the security issue one of the most important aspects to consider in this field. However, most of protocols optimize for the limited capabilities of sensor nodes and the application specific nature of the networks, but...
In our previous work, we have shown that hybrid ARQ (HARQ) can be used to achieve secret communication over a fast fading channel. This is a physical-layer technique that can be used in conjunction with conventional cryptography to provide further protection from an eavesdropper. The key to our previous work was to use reliability-based HARQ to improve the decoder performance at the desired user much...
A Wireless Sensor Network (WSN) contains several sensor nodes with very limited sources such as a small microcontroller and a battery. These features usually result in difficulties in employing most of the conventional wireless network protocols (e.g., security protocols) unfavorably. Research on especially increasing reliability of the WSNs employed in health applications recently receives a remarkable...
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication...
Today's Internet is facing routing scalability issues, which could degrade network performance seriously. To solve that, several solutions are currently being discussed. Among them, one promising approach is to set up a new architecture which separates the locator and the identifier roles of current IP addresses. A key question for the solution is how to provide an efficient and reliable service for...
Trust establishment in wireless ad hoc networks is a challenge because of its unique characteristics. These include the lack of a central authority and the autonomous, dynamic nature of these networks which result in poor connectivity and routing failure. Security can be provided by a certificate based model but key management is a difficulty in wireless ad hoc networks. A key management scheme is...
Vehicular networks are the major ingredients of the envisioned intelligent transportation systems (ITS) concept. An important component of ITS which is currently attracting wider research focus is road traffic monitoring. The actual approaches for traffic road monitoring are characterized by longer response times and are also subject to higher processing requirements and possess high deployment costs...
Due to very sensitive and crucial nature of the collected data, any wireless sensor network (WSN) has to handle efficiently securing it as well as to employ energy-aware and delay-sensitive algorithms in its all layers from application to the physical. These key topics strictly related to each other are of high importance for building and maintaining reliable and long-lasting WSN applications. However,...
The field of quantum communication is mature enough to be clearly divided into an applied side, around Quantum Key Distribution, and a fundamental research program. The applied side is driven by real-world applications with concerns like reliability and costs. The second aspect is still mainly curiosity driven and aims, among other things, at extending the distance of fiber-based quantum communication...
Data transmission, such as software update, large file broadcasting and video on demand, can take advantage of the wide coverage and the broadcasting features of the satellite networks. The multicast technologies provide the support for these applications by efficiently using the expensive satellite bandwidth. One of them is the file delivery over unidirectional transport (FLUTE) protocol that is...
Node join authentication and pair-wise key establishment are essential services to provide confidentiality and authentication to the data communication between any two nodes in a network. Since wireless sensor networks are equipped with resource constrained nodes and therefore energy efficient protocol design is required to provide long network life, we have made an analysis of communication overhead...
Ethernet has grown since its inception by Metcalfe in 1976. Its growth as a wide-area networking technology has led to a need for operations, administration and maintenance (OAM) requirements. The expansion of this technology into the domain of service providers, where networks are substantially larger and more complex and the user-base is wider, makes the idea of robust and reliable connectivity,...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
Consider a wireless transmission from Alice to Bob in the presence of an eavesdropper, Eve. We propose a technique to allow Alice to send a message such that Bob can decode it but Eve can get little information about the message. This scenario is a classic example of the wiretap channel, for which several researchers have begun to develop practical schemes. However, we consider a challenging version...
Key management using threshold cryptography has proved its advantages by eliminating the dependence on an online central authority. However, some previous models are not suitable due to the inflexibility in dealing with keys. Moreover, solutions for those models are not complete; there are still vulnerabilities for attacks, especially DoS attacks. This paper will propose a more flexible modified key...
In wireless sensor networks, malicious sensor nodes send false data reports to distort aggregation results. Existing trust systems rely on general reputation to mitigate the effect of this attack. This paper presents a novel reliable data aggregation protocol, called RDAT, which is based on the concept of functional reputation. Functional reputation enables data aggregators to evaluate each type of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.