The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future...
The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users...
In today's classified networks, system health and availability are crucial to support the mission needs of the US Government. Inclusion of sensing appliances into these sensitive networks has been a priority for several years to achieve the situational awareness of the network. The purpose of this paper is to demonstrate how an encryptor at the network boundaries enhanced with Deep Packet Inspection...
There is usually a tradeoff between security strength and computing power in a real time health monitoring system. In this paper, we firstly investigated the performance of several cryptographic protocols for different data sizes applied on the system in different network condition, and then presented a security protocol adaption scheme allowing to automatically change the encryption algorithm to...
With the cutting-edge technology, people are migrating towards the use of mobile devices. But, unfortunately these devices are susceptible to loss and theft, and they often contain sensitive data that their owner would prefer to keep secure. Protecting these data during loss or theft has motivated us to develop this system. One way to protect data is to use persistent authentication, that requires...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.