The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information Centric Networks (ICN) is very promising for Internet of Things (IoT) deployment, where the data-centric approach is useful in reducing the data retrieval latency as well as the network traffic for IoT services. Also, the innetwork caching capabilities in ICN limits the massive data access to the data producers and so relaxes the need of continuous connectivity E2E connectivity between...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
The Internet of Things (IoT) is a massive group of devices containing sensors or actuators connected together over wired or wireless networks. With an estimate of over 25 billion devices connected together by 2020, IoT has been rapidly growing over the past decade. During the growth, security has been identified as one of the weakest areas in IoT. When implementing security within an IoT network,...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
Anonymous communications are growing extremely fast because more and more Internet users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view. Different studies have shown important design flaws in these systems that could break users' anonymity and how these...
with the increasing popularity of network technology in China, the new mode of shopping, trading, payment through the Internet is developing rapidly. E-commerce with its low cost, high efficiency advantages, not only enjoyed by ordinary consumers, but also effectively promotes the small and medium enterprises to find business opportunities to win the market. It has become China's transformation of...
NATO doctrine [1] clearly expresses that the establishment of a peaceful and secure environment requires a comprehensive political-civilian-military approach to crisis management [2]. According to [1], coherence was achieved through the harmonization of strategic processes, planning and objectives across the civil and military actors. This requires the establishment of trusted information channels...
The inter-domain routing protocol of the Internet, i.e., Border Gateway Protocol (BGP), is vulnerable to malicious attacks. Although many security solutions for BGP have been proposed, they have mainly focused on topology-based security. Policy-based security has largely been overlooked—a severe concern especially since BGP is a policy-based routing protocol. In this paper, we present an Expectation...
Along with the arrival of the Internet era, all walks of life are beginning to promote the wisdom of the process. As the concept of "smarter planet" and "wisdom city" is put forward, the school as the frontier of knowledge and information service, as a new talent incubator should seize the opportunity and apply the advanced information technology to promote the construction of...
The Internet revolution has led to the rise of trackers--online tracking services that shadow users' browsing activity. Despite the pervasiveness of online tracking, few users install privacy-enhancing plug-ins.
The Internet is often thought to be a model of resilience, due to a decentralised, organically-grown architecture. This paper puts this perception into perspective through the results of a security analysis of the Border Gateway Protocol (BGP) routing infrastructure. BGP is a fundamental Internet protocol and its intrinsic fragilities have been highlighted extensively in the literature. A seldom studied...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
The Domain Name System (DNS) is used in the Internet to map Fully Qualified Domain Names to IP addresses. As the Internet continuously grows, there have been challenges in keeping up with the demands on the DNS service. Recently, ICANN announced the introduction of new generic Top-level Domains (gTLDs). Using packet traces collected from a large edge network, we analyze the usage of TLDs between 2008...
The popularity of Wireless Sensor Networks (WSN) is increasing in critical infrastructure, smart metering, and home automation. Of the numerous protocols available, Z-Wave has significant potential for growth in WSNs. As a proprietary protocol, there are few research publications concerning Z-Wave, and thus little is known about the security implications of its use. Z-Wave networks use a gateway controller...
A key requirement for a smart grid deployment is a robust and secure communications network to access all components. We present a platform that provides easy connectivity to smart grid and automation components from the Internet with security and availability as the main objectives. The system is already in production for home automation remote access.
To support voice calls vital to mobile users and carriers, 4G LTE cellular networks adopt two solutions: VoLTE (Voice Over LTE) and CSFB (Circuit-Switched FallBack). In this paper, we disclose that both schemes are harmful to mobile users from a security perspective. The adoption of the latest VoLTE allows an attacker to manipulate the radio resource states of the victim's device in a silent call...
The distribution domain of the smart grid incorporates advantages of the newest substation automation standards in order to enhance distribution network automation. State-of-the-art distribution automation solutions use the public Internet for exchanging data between substation and control center. This presents challenges for cybersecurity, particularly for critical data determining distribution network...
The Connected Revolution has reached the automotive industry and the Internet penetrates into the modern vehicles. Formerly acquiring data from a vehicle was the tool of Fleet Management Systems handling commercial vehicles. In the recent years connectivity began to appear in the passenger vehicles also. The first features were infotainment and navigation, having low security needs remaining far from...
In IPv4, ICMP was used for error reporting and flow control management among others. Due to lack of security consideration in the design of ICMPv4 protocol leading to numerous vulnerabilities, this has led to exploitation and attacks on a particular network. IPv6 is a new protocol introduced to replace IPv4 in order to circumvent IP address depletion. ICMPv6 now has expanded role, so security measures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.