The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
Inside MANET, mobile devices can move independently devoid of pre established infrastructure. In this type of network there is no fixed topology for the network. To increase the coverage range and to obtain the global type of services these MANETs can be joined to other type of networks. For combination of heterogeneous type of networks, intermediate one which is a gateway is used to form a hybrid...
Anonymous communications are growing extremely fast because more and more Internet users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view. Different studies have shown important design flaws in these systems that could break users' anonymity and how these...
The Border Gateway Protocol (BGP) is the routing protocol used to route Internet's traffic between different Autonomous Systems. The BGP can control the traffic but it is vulnerable to communication interruptions and failures. This weakness could be the source of a several security attacks which could cause serious damages to the inter-domain network. The objective of this paper is to introduce briefly...
Among the current information security prevention systems such as firewalls and intrusion detection systems, there exist several shortages such as alert overload, high false alarm rate, absence of effective alert management mechanism etc. As a result, there is a tremendous amount of alert data overload in the network, and this data could be redundant, irrelevant or meaningless. The result of this...
Research teams collaborating across institutional, geographical and cultural boundaries are increasingly common. Funding agencies including the National Science Foundation (NSF) and National Institutes of Health (NIH) strongly encourage virtual organization building and collaboration across institutions and disciplines. A set of software tools that enables scientists to efficiently share information...
In order to solve the security problem and broadcast storm problem of cluster in P2P, a first coming clustering algorithm based on reputation is presented. This algorithm, taking reputation as one of the criteria for the evaluation of a node, is to improve the secure of the interactions between nodes. And it also effectively resolve the broadcast storm risks by optimizing the structure of cluster,...
In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement...
Recent advances in home networking devices and the increase in users connected to the internet, has allowed "home automation" to gain more attention. Home automation is the process of accessing and controlling home devices from remote locations across the Internet. Today, modern technology has reached a point in which computing devices are common in every facet of our life. We encounter...
We are living in the age of electronics where a vast range of devices-from small handheld mobile devices to super mainframe computers-have become commonplace. We are experiencing a move towards the vision suggested by Mark Weiser of the ??computer everywhere,?? and increasingly use computers as an essential part of our daily lives. With the advancement in electronic and networking devices at home...
Name Services for the Internet of Things (specifically, the EPCglobal Network) are distributed systems that serve the following fundamental lookup function: Given an identifier for a real-world object, e.g., an Electronic Product Code (EPC), they return a list of Internet addresses of services, which offer additional information about this object. Without name services acting as a broker between items...
Network security problems emerge in an endless stream and cause the inestimable damage. To solve network security problems efficiently, it is not enough to make good protection at nodes or protect networks from outside attacks. Many network security problems should be solved efficiently in collaborative approaches which can integrate various resources over internet to defense network security. In...
Bit-Torrent is the most popular peer-to-peer software because of its efficiency for distributing files. However, Bit-Torrent file sharing is infamous for copyright infringement, making the establishment of rights management technologies an urgent need. In this paper, we propose a digital rights management (DRM) mechanism to protect the copyright in Bit-Torrent. It will be a novel business model of...
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For security and privacy reasons, the exchanged data should be encapsulated and encoded by a specific standard, a customized standard even. In this study, we first focused on investigating the importance of data exchange and message...
Grid systems provide a standard platform to share resources, such as computing facilities and backup services, between research communities and commercial organizations. Nowadays there are plenty of grids among different institutions, and many of them are probably heterogeneous to others because they are constructed by different types of middleware. Enabling all these grids to work as a single grid...
Several service discovery protocols are deployed in local-area networks allowing users to be informed about the services in their vicinities. However, these local-area discovery protocols are incapable of exposing the services to remote users. This paper proposes a P2P-based naming system to ensure wide-area service discovery for communications between devices and services often remotely located....
A Personal Network (PN) is a network of distributed personal devices that communicate with each other independently from their geographical location. By adding extra functionality to PNs it is possible to enable cooperation between PNs forming a group-oriented network called Fednet. A Fednet is a secure, opportunity or purpose driven ad-hoc sharing of personal resources. In this paper, we provide...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.