The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is an emerging subject which enables multiple applications and requires robust security solutions. IoT architectures contribute to critical aspects of our society like transportation, health-care, industry, telecommunications and many others. Security is difficult to be implemented in the IoT context because the embedded devices are resource constrained and deployed in uncontrolled...
Authenticating users connecting to online services, social networks or m-banking became an indispensable element of our everyday life. Reliable authentication is a foundation of security of Internet services but, on the other hand, also a source of users' frustration due to possible account blocking in case of three fails. In this paper we propose a model of authentication service management which...
The Internet has evolved greatly in this decade. For economic benefits, the management of Internet networks needs to adapt to mass changes without huge modifications in hardware and software. Especially in campus networks, there are a variety of users and devices with different Quality of Service (QoS) requirements and management policies. Software-defined networking (SDN) decouples the data and control...
The Internet of things (IoT) interconnects every object of our living space to the Internet. Its adoption relies on the settling down of robust security solutions, especially key management ones. In this paper, we address key management protocols in the Internet of things (IoT). Since the IoT interconnects heterogeneous nodes, key management protocols used in the Internet might not be adapted for...
The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, as requested by the IMO e-navigation strategy, and as derived from testbeds focused on e-navigation. This paper proposes a lightweight user authentication protocol where the MQTT(Message Queue Telemetry Transport) type protocol registers unique topic values from...
Metropolitan scale WiFi deployments face several challenges including controllability and management, which prohibit the provision of Seamless Access, Quality of Service (QoS) and Security to mobile users. Thus, they remain largely an untapped networking resource. In this work, a SDN-based network architecture is proposed; it is comprised of a distributed network-wide controller and a novel datapath...
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spite of the differences in resource availability, threat models, vulnerabilities, information formats, and communication protocols, there is a great...
In this work we seek to achieve VoIP end users' profile privacy without violating the QoS constraints on the throughput, end to end delay, and jitter, as these parameters are the most sensitive factors in multimedia applications. We propose an end-to-end user anonymity design that takes into consideration these constraints in a hybrid environment that involves ad-hoc and infrastructure networks. Using...
LTE's success as a high throughput, low latency, and umbrella technology for wireless heterogeneous networks is highly affected by the researchers' capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome vulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP's mutual authentication implementation in EPS AKA succeeded...
The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations...
The entire telecommunications and services world has focused its attention on the newest 3GPP architecture, 4G. Proposing high speed data transfer, all flat-IP network for the core systems and stronger authentication and AAA methods, this architecture seems to be the answer for the mobile networks of the future. Another architecture described by 3GPP as well, but based on IETF standards is the IMS...
The convergence of third generation (3G) wide area wireless network and wireless local area network (WLAN) offers characteristics that complement each other perfectly. To provide secure 3G-WLAN convergence, extensible authentication protocol-authentication and key agreement (EAP-AKA) protocol, that has got many risk, is used. This paper elaborate risks in using EAP-AKA for 3G-WLAN convergence, proposes...
Cooperative communication is considered a promising technique to increase channel capacity and improve reliability in wireless and cellular networks. However, it also raises a number of serious security issues as malicious nodes may impersonate and affect the integrity of the communication. In this paper, we propose a prevention-based security technique for cooperative communication taking into consideration...
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible...
Security in mobile ad hoc networks (MANET) Quality of Services routing has received increased attention in recent years. This paper proposes mechanism to obtain secure MANET QoS routing with regard to QoS considerations. Our goal is to present a new mechanism over on-demand multi-path routing protocol (AOMDV) that tackles the twin issues of reliability (protection against failures of multiple paths)...
Multimedia services are becoming increasingly available over the wireless devices. Handover performance has a direct impact on user satisfaction from such services. The high transition delay can be unaccepted for the multimedia application or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features,...
The primary role of network access control is to decide on the validity of user's identity accepted into the networks and authorization accessed to the particular resource so that users conforming to their established access polices achieve predefined services. This paper presents a specific scenario which supports quality of service (QoS) in network domain. The QoS access rules are based not only...
EPS (Evolved Packet System) was designed with a new radio access network LTE (Long Term Evolution). But EPS also supports natively non-3GPP accesses with associated QoS (Quality of Service), security and mobility requirements. Although the initial EPS deployment would be with the introduction of LTE for providing higher data rate, operators would still need to introduce non-3GPP accesses, e.g. WiFi,...
The following topics are dealt with: cyber-enabled distributed computing; knowledge discovery; distributed control; data mining; wireless communication; mobile communication; agent; middleware; mobile system; Internet protocol; quality of service; parallel computing; authentication; privacy; system management; neural network; reasoning; and cloud computing.
In this paper, a comprehensive Quality of Security Service (QoSS) model for addressing security within a Service-Oriented Architecture (SOA) is proposed. We define a detailed SOA security model that supports and incorporates a number of networking security techniques and protocols. It utilizes symmetric keys, public keys and hash functions techniques, in order to provide different levels of QoSS agreements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.