The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth...
In Recent years, the development of smart home applications based on OSGi framework has attracted increasing attention on the delivery of services on heterogeneous devices or platforms. In OSGi framework, bundles communicate with each other through service layer. However, the communication across OSGi frameworks for sharing services or exchanging information is rather limited and has no standard definition...
Recently, an intrusion detection system which named CONFIDANT was proposed, which utilized file integrity analyzers and mobile agent for intrusion detection and aimed to detection of malicious activity by insiders. But CONFIDANT has vulnerabilities in security aspect, the sensor agents in the lowest echelon are easily compromised by malicious platforms. Therefore, we integrate a security mechanism...
This paper presents a cluster-based self-organizing algorithm for creating automatically ad-hoc networks including diverse wireless devices such as PDA, cell phones, laptops, wireless sensors, etc. In the proposed strategy each mobile device is represented by a multi-role agent, which generates a backbone among the devices within the environment based only on local interactions. During the operation...
The Proxy Mobile IPv6 (PMIPv6) was proposed to provide the Internet mobility for a host that is not equipped with any mobility software. However, the PMIPv6-based handover is still for further study. In this paper we propose a handover scheme of PMIPv6 with bicasting for IP handover. The handover performance of PMIPv6 can be enhanced with the help of bicasting in the network.
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.