The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
The Internet of Things is becoming a critical subject nowadays and along with an increasing adoption of ubiquitous computing devices security becomes an issue which must be approached in different application contexts. One notion that gains traction along with the IoT (Internet of Things) paradigm is the social context of embedded devices. This paper proposes a participatory verification security...
The huge number of sensors envisioned to be deployed within Internet of Things applications will result in large amounts of likely confidential data that will be required to traverse the open Internet. This confidential data could range from the current security status of a smart house to the current health status of an elderly person connected to smart monitors. A secure and able connection will...
With the proliferation of sensor-embedded mobile computing devices, participatory sensing is becoming popular to collect information from and outsource tasks to participating users. These applications deal with a lot of personal information, e.g., users' identities and locations at a specific time. Therefore, we need to pay a deeper attention to privacy and anonymity. However, from a data consumer's...
An implementation scheme for security system in intelligent residential district is presented in this paper. The security system is composed of home security subsystem, access control system and residential security control network. Hardware and software architecture of the home subsystem and design of the control network are introduced in detail. Problems of wired networks are solved due to the application...
There is usually a tradeoff between security strength and computing power in a real time health monitoring system. In this paper, we firstly investigated the performance of several cryptographic protocols for different data sizes applied on the system in different network condition, and then presented a security protocol adaption scheme allowing to automatically change the encryption algorithm to...
Correctional Service Canada (CSC) operates 57 Institutions equipped with a range of mission critical Security, Communications and Access Management systems. These include CCTV assessment, intrusion detection, radio communications and door control systems. User Interfaces range from colour graphic touch screens to knobs, push buttons etc. Operational and technical challenges include the following issues:...
Most of the environments where mobile robots are deployed offer a comprehensive networking infrastructure. In order to take part of these environments, mobile robots must enhance not only their communication capabilities, but also their interaction capabilities. Current robotic frameworks are oriented to gather data from the robotic sensors and to act on the robot's actuators. In other words, such...
The paper deals with the area of user authentication. This service is fundamental for present networks and their security so we start with modern AAA (Authentication, Authorization and Accounting) protocol analysis. As a result of current state and protocol analysis we identify main problems in the field of user authentication - insufficient flexibility and therefore lack of security. These properties...
Countermeasures against botnet, which has been recognized as the Internet??s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in a particular ISP domain, international cooperation...
Body area network (BAN) is an emerging technology which receives significant interest recent years. Typical BAN applications include healthcare, military, sports and first-responder. There is a great need to make BAN data transmission secure, accurate and protected. This paper presents a two-tier secure group communication framework (SG-BAN) for BAN data exchange, file sharing and remote display....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.