The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidth which is specially scarce in wireless networks, and must therefore be judiciously controlled in order to attain desired trade-offs between security risks and resource consumption. The desired tradeoffs can be attained...
Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today's cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the...
The limitation of each wireless technologies in terms of coverage, bandwidth or delay, has enforced the concept of integrated heterogeneous high speed wireless access. However, with the integration of different technologies provided by different operators, maintaining security remains a challenging proposition. When a mobile device moves in and out of the coverage of one wireless network to another...
This paper presents a distributed authentication architecture based on peer-to-peer networking paradigms to minimise the delays in authenticating and authorising mobile nodes roaming across different wireless networks. The fundamental principle is to provide a mechanism to shift elements required for authentication closer to the mobile node's current point of access thus reducing the need for interaction...
Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such...
Denial of Service (DoS) attacks pose a serious threat to wireless networks. In WiMAX a large number of authentication requests sent to the Base Station (BS) by rouge Subscriber Stations (SSs) might lead to a DoS attack. Since authentication involves exchanging and checking certificates of both parties and is a computationally heavy task, the BS would allocate most of its resources for the process...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
The deployment of wireless networks is in permanent growth. To exploit their intrinsic mobility advantages, collaborative networks such as first responder networks (FRNs) have recently adopted wireless networking technologies, Albiet at a small scale. FRNs require the collaboration of heterogeneous and mobile groups. Impeding the wide-scale use of wireless networking in FRNs are the many security...
In this paper we present a solution for providing a fast handover in wireless networks which involve network access control based on the ExtensibleAuthenticationProtocol. We propose an approach based on cryptographically generated identities, which reduces the number of round trips during authentication phase and achieves the objective of reducing the impact on existing EAP deployments.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.