The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
Malicious actors are increasingly using TLS to evade deep packet inspection (DPI). In response, vendors and enterprises have turned to man-in-the-middle (MITM) proxies to enable security monitoring of encrypted traffic. This approach not only breaks the end-to-end authentication component of TLS but requires clients to trust a root certificate that allows the proxy to masquerade as any domain. This...
Decentralized Continuous Double Auctioning offers a flexible marketing approach to power distribution in resource constrained (RC) smart micro-grids. Grid participants (buyers and sellers) can obtain power at a suitable price both at on or off-peak periods. Decentralized CDA schemes are however vulnerable to two attacks, namely - 'Victim Strategy Downgrade' and 'Collusion'. Both attacks foil the CDA...
In a WSN, sink-node gathers data from surrounding nodes and sends it to outside world via a gateway. Therefore, its location information is important to both attacker and network operator. The former can launch attacks on a sink-node to steal information or damage it, while the latter must hide its location to ensure data's safety, and physical protection. Providing sink-node location information...
The use of cloud computing solutions for storing large volumes of data presents advantages such as scalability, availability, and virtually “unlimited” storage capacity. However, ensuring basic requirements such as integrity, availability, and privacy in a cloud infrastructure provided by unreliable third parties is a challenge, especially when the loss or leakage of information can bring significant...
A large variety of content sharing applications rely, at least partially, on gossip-based dissemination protocols. However, these protocols are subject to various types of faults, among which selfish behaviours performed by nodes that benefit from the system without contributing their fair share to it. Accountability mechanisms (e.g., PeerReview, AVMs, FullReview), which require that nodes log their...
WSN is mainly used at such a place, where the normal wired network configuration is not possible. So, the sensor nodes are deployed over such places to perform monitoring and tracking. Sensor nodes communicate in their transmission range only, so if the sink node is not present in their range, the message will be delivered in multi-hop fashion. There is a high chance that the communication over the...
The Internet is dramatically evolving and creating various connectivity methodologies. The Internet of Things (IoT) is one of those methodologies which transforms current Internet communication to Machine-to-Machine (M2M) basis. Hence, IoT can seamlessly connect the real world and cyberspace via physical objects that embed with various types of intelligent sensors. A large number of Internet-connected...
Conventional quantum key distribution (QKD) schemes determine the amount of leaked information through estimation of signal disturbance. Here we present a QKD protocol based on an entirely different principle, which works without monitoring the disturbance. The protocol is implemented with a laser, an interferometer with a variable delay, and photon detectors. It is capable of producing a secret key...
Most modern metropolitan cities have suffered from increasing traffic accidents and jams. Vehicular ad hoc network (VANET), consisting of information collecting, processing and transmitting units embedded in vehicles assisted by roadside infrastructures, has been proposed as one the most promising solution to problems introduced by the increasing number of vehicles in modern cities. To achieve the...
Although privacy concerns in smart metering have been widely studied, relatively little attention has been given to privacy in bi-directional communication between consumers and service providers. Full bi-directional communication is necessary for incentive-based demand response (DR) protocols, such as demand bidding, in which consumers bid to reduce their energy consumption. However, this can reveal...
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, trust and privacy concerns continuously surface as a key deterrent to the adoption of these emergent technologies. The ensuing literature presents a Secure,...
Modern mobile and wearable devices are enabling the realization of so-called ubiquitous computing. This provides citizens the technological means to contribute to urban management by becoming sensors within a smart city. Notwithstanding, the health sector is a very crucial factor for city management, imposing restrictions to the decisions directly or indirectly. The question that arises is given the...
Cognitive radio plays an important role in improving spectrum utilization in wireless services. In the cognitive radio paradigm, secondary users (SUs) are allowed to utilize licensed spectrum opportunistically without interfering with primary users (PUs). To motivate PU to share licensed spectrum with SU, it is reasonable for SU to pay PU a fee whenever the former is utilizing the latter's licensed...
In recent years there has been a growing increase in the number of users that use social networks as a form of expression and sharing. These networks of social relationships are by now widespread thanks both to the growing availability of fast Internet connections and the spread of mobile devices such as smartphones and tablets. In particular, the capability of these latest generation mobile devices...
Troubleshooting network outages is a complex and time-consuming process. Network administrators are typically overwhelmed with large volumes of monitoring data, like NetFlow data, and are often ???left alone???, fighting problems with very basic debugging tools, like ping and traceroute. Distributed network traffic monitoring and intelligent correlation of data from different Internet locations are...
In most of today's healthcare and AAL scenarios a multitude of data is recorded by different sensors for various purposes. By definition, this data is mostly personal and can be assigned to certain persons, which again makes it interesting for shady data miners, hackers, or even health insurance companies. Thus, this data needs special care regarding privacy and security. On the other hand, if the...
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. The operation of V2G networks is based on continuously monitoring the status of individual EVs as well as a designed incentive scheme to attract sufficient participating EVs. However, the close monitoring might raise privacy...
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support the large number of hosts required for the Smart Grid on an IP network, the new Internet Protocol version 6 (IPv6) must be leveraged. Unfortunately,...
The System architecture presented in this paper is developed in DEMONS project of the European FP7 framework project to realize the trustworthy multi-domain network with collaborative and decentralized security and privacy monitoring system. The system architecture so developed comprises of five sub-systems: (i) programmable monitoring nodes called BlockMon nodes providing the monitoring infrastructure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.