The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. Therefore, security in WSNs is a challenging task due to inheritance limitations of sensors and it becomes a good topic for researchers. In this work, we focus at secure hierarchical routing protocols in wireless sensor networks and represent selected approaches which focusing...
The decentralized design of Peer-to-Peer (P2P) protocols inherently provides for fault tolerance to non-malicious faults. However, the base P2P scalability and decentralization requirements often result in design choices that negatively impact their robustness to varied security threats. A prominent vulnerability are Eclipse attacks that aim at information hiding and consequently perturb a P2P overlay's...
One of the fundamental requirements of Cloud Computing is the capability to provide scalable, transparent and isolated networks. This is achieved by using L2 segmentation via 802.1Q VLANs or overlay approaches such as 802.1ad, VxLAN, "Stateless Transport Tunneling" (STT) or "Network Virtualization using Generic Routing Encapsulation" (NVGRE). All of these technologies struggle...
The objective of the work is to improve the mechanism for selecting trust nodes which will participate in the key generation process for secured group communication in a distributed environment like MANET. The selection is proposed in two stages, the first phase adopts clustering technique to identify trust worthy nodes across the network and the second phase makes use of the backtracking approach...
Mobile ad hoc network (MANET) is a distinct kind of network where the nodes are connected by way of wireless medium and without any infrastructure. Nodes in the network are fully dependent on other nodes so as to complete the mission successfully. In addition to this, nodes are moving freely and make dynamic topology. Moreover these types of networks can be easily constructed whenever and wherever...
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker...
Internet is so popular that nearly everybody using it every day. Current Internet shows some characteristics of intelligent. For example, it can help people find the proper resources using semantic search. So this paper focuses on the wisdom of Internet. Firstly, the definition and relationship among information, knowledge and wisdom are introduced. Then, the definition of Internet information, Internet...
Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future...
Wireless sensor networks offer inexpensive solutions in a wide variety of applications ranging from health, home, roads and public area monitoring to industry and aircraft control. As sensors proliferate, scalable communication protocols with low implementation requirements are pursued. Another key issue for the wider deployment of these solutions is security since the wireless sensor networks themselves...
As the network technology and applications continue to evolve, computer networks become more and more important. However, network users can attack the network infrastructure (such as domain name service and routing services, etc.). The networks can not provide the minimum required quality of service for control. Network situation can not be aware in a timely manner. And network maintaining and upgrading...
Information-centric network (ICN) has been recognized as one prospective approach for redesigning network architecture. In ICN, name based resolution/routing (NBRR) needs to be designed to discover and retrieve the closest copy of information by its name. Herein, we firstly identify the design requirements of NBRR, and propose a reference architecture as Named Information Network Architecture (NINA)...
We present a new Internet architecture based on de-conflated identities (ADI) that explicitly establishes the separation of ownership of hosts from the underlying infrastructure connectivity. A direct impact of this de-conflated Internet architecture is the ability to express organizational policies separately and thus more naturally, from the underlying infrastructure routing policies. Host or organizational...
This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core...
Most Distributed Hash Tables (DHTs) inherently assume interconnecting nodes with homogeneous capabilities. Realistically however, capabilities of nodes on a network widely vary, leading traditional DHTs to inevitably exhibit poor performance in real-world environments. Stealth DHT was previously proposed to address node heterogeneity by enabling a DHT to separate highly capable (super-peers or service)...
In this paper, I will develop two major claims. First the, Future Internet should be polymorphic and conciliate different architectural paradigms networking. The second claim is that the Future Internet should be build on strong theoretical basis from a Networking science that is in course of development. In this paper, I have used the concept of cooperation as an interpretation lens. Specifically,...
IP multicast originally works in any source multicast (ASM) that comes with great burden and dynamics on the backbone routers and weakness in inter-domain scalability. It also brought serious security and management problems. In contrast, source-specific multicast (SSM) has been recognized as a simple, scalable and secure method, especially in inter-domain multicast. However, its applicability to...
A reliable storage system is a system that ensures the protection of data from loss. Such systems are needed in many critical fields. We cannot imagine that a financial institution looses data about one its clients. Moreover the exponential growing volumes of the data and its availability are crucial issues. A centralized storage system would be overloaded and be a single point of failure. That is...
MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) has been proposed to address the naming and addressing challenges for NGI (next generation Internet), we present several design enhancements for MILSA which include a hybrid architectural design that combines "core-edge separation approach" and "split approach", a security-enabled and logically oriented...
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper,...
At the beginning of its journey, wireless sensor networks (WSNs) were not built keeping security in mind. Along with the proliferation of sensor applications, the need for security in sensor networks has been increased. However, due to the resource constrained sensor nodes as well as its unique nature of communication, it is very difficult to use traditional security solutions for sensor networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.