The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Covert channel in network protocols has been an area absorbing great interests for many years in secret transmission. Recently, covert channels based on packet length have become a new preference among researchers in this field because of their excellent performance in simulating statistical features of network packets in real world. However, few approaches which can embed secret information with...
Enhanced solution of topical scientific and practical problem associated with the development of flow-based model of multipath routing with paths overlapping by nodes in Telecommunication Network (TCN) was presented. This model is further extension of the well known multipath routing model based on the introduction to the structure of non-linear constraints responsible for the calculation of routes...
Covert channels are a network security risk growing both in sophistication and utilization, and thus posing an increasing threat. They leverage benign and overt network activities, such as the modulation of packet inter-arrival time, to covertly transmit information without detection by current network security approaches such as firewalls. This makes them a grave security concern. Thus, researching...
Security in building automation systems (BAS) recently became a topic in the security community. BAS form a part of enterprise networks and can be utilized to gain access to a company network or to violate a security policy. Up to now, the threat of covert channels in BAS protocols was not discovered. While a first available solution can limit ``high level'' covert channels in BAS, there is no solution...
In wireless networks, security has become the prime factor of concern. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANETS), furthermore leads to a situation where it is very difficult to establish secure data transmission. Since the use of mobile equipments such as cellular phones or laptops is tremendously increasing and because of limited physical security, vulnerability...
This paper considers the problem of simultaneously communicating high-security and low-security messages, referred to as the security embedding problem. An information-theoretic model is presented. A coding scheme that combines superposition coding and random binning is proposed and is shown to achieve the capacity region in several communication scenarios. As an application, it is shown that a simple...
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows....
Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and energy-expensive to transmit sequence number directly...
In a cognitive radio network, cooperative spectrum sensing is conducted among the secondary users so as to improve the sensing performance. However, it's not necessary to cooperate all users to perform spectrum sensing while achieve a given error bound. In this paper, we investigate the problem of optimal number of secondary users in cooperative spectrum sensing. Moreover, an efficient and robust...
This paper explores network security as a game between attacker and defender. In this game, the attacker and defender both anticipate each other??s best strategy. Thus, instead of focusing on the best response to an attack, the paper analyzes the Nash equilibrium for the joint strategies. The paper studies two types of problem. The first type concerns networks where the data can be modified by an...
A firewall is a system that provides security to a network, and it exists at the interface between a private network and the Internet. All incoming and outgoing packets have to pass through the firewall via several different layers. Gamage, Leiwo, and Zheng have studied the verification of message authentication in the firewall application layer on the basis of digital signcryption. Encrypted message...
ASP mode-based networked manufacturing system is a resource sharing platform, and network securities especially the authentication is essential to this system. This article studied USB key based digital certificate authentication mode, and then analyzed its merits and limitations, finally applied challenge-response and time-stamp technologies to form a new authentication protocol to enhance the validity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.