The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
The potential of full-duplex in communication design has been recently considered for emerging technologies such as 5G. Moreover, full-duplex can play a crucial role in upcoming secure communication scenarios too. However, results in the literature are limited and only explore scenarios, where the wireless channel is used either for key generation or for secure messaging. Our first contribution is...
Physical layer security has become popular in recent years. In satellite communication systems, wire-tap users are easy to obtain information from satellite side for the range of the beam is broad. In this work, we consider the multi user scenario, by adopting the dynamic beam forming in satellite networks, the beam could be restricted into the small range, where wire-tap users could not obtain information...
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is...
Mobile hosts in a Mobile Ad-Hoc Network are linked by wireless links without usual routing infrastructure and link fixed routers. Ad-Hoc Distance vector Routing (AODV) is among one of the prominently used routing protocol for packet transfer from source to destination. It relies on maintaining most recent information, for which, each ad-hoc node maintains hop count and sequence number field. Ad-hoc...
The discrete memoryless Z-Channel (DM-ZC) with a confidential cross-message is considered. Three messages are transmitted; encoder 1 transmits one message to be decoded by decoder 1. Encoder 2 transmits two messages, the first of them is to be decoded by decoder 2; the second message is to be decoded by decoder 1 and is required to be kept secret from decoder 2. The secrecy level is measured by the...
Maintaining both reliable and secret communication involves different objectives: ensuring sufficient throughput for reliable communication and ensuring the secrecy of the associated communication. The optimal solution for one of these objectives might not be optimal or even suitable for another objective and thus a question arises as to what is the appropriate criteria for fairly balancing these...
The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. This paper presents an authentication and session-key establishment protocol that enabling mutual authentication procedure between involved entities in the WSNs. This scheme...
In this paper we present a new code design technique which produces best equivocation codes (BEqC) with highest minimum distance for syndrome coding which have better secrecy than the best known error correcting codes (BKC). The best equivocation codes of highest minimum distance have been determined by using a combination of a code design technique based on extensions of the parity check matrix from...
In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing...
In this paper, we propose a novel algorithm for reducing the size of certificate revocation lists (CRLs) created and distributed for IEEE 802.11s-based Smart Grid Advanced Metering Infrastructure (AMI) networks. Rather than maintaining a huge-size single CRL that introduces unnecessary search time and storage, the idea is to generate groups of smart meters (SMs) within the AMI network and create CRLs...
In this paper, we study the problem of resource allocation for a multiuser orthogonal frequency-division multiple access (OFDMA) downlink with eavesdropping. The considered setup consists of a base station, several users and a single eavesdropper that indents to wiretap the transmitted message within each OFDMA subchannel. By taking into consideration the existence of the eavesdropper, the base station...
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is answerable for updating configuration parameters of, and distributing management instructions to, the sensor nodes. All existing data discovery and dissemination protocols undergo from two drawbacks. First, they are based on the centralized approach; only the base station can distribute data item. Such an approach is...
This paper presents a wireless digital conference system which adopts dual-mode (white-light LED and infrared light) visible light communications (VLCs) wireless technique, which the downlink communication uses white-light LED transmission and the uplink communication chooses infrared transmission. Compared to traditional RF-based wireless digital conference system, our proposed VLC-based wireless...
IEEE GLOBECOM 2014, the premier international conference dedicated to the advance of the entire array of global communications, has announced the senior-executive and industry panel agenda for its 57th annual event to be held December 8-12 in Austin, Texas. Declared IEEE Week by Austin Mayor Lee Leffingwell, the five-day event will be highlighted by more than 1,500 presentations covering the latest...
Increased use of unmanned systems in various tasks enables users to complete important missions without risking human lives. Nonetheless, these systems pose a huge threat if the operational cyber security is not handled properly, especially for the unmanned aerial vehicle systems (UAVS), which can cause catastrophic damages. Therefore, it is important to check the impact of various attack attempts...
This work aims to formulate a procedure to establish a graded trust system within autonomous vehicular networks. A trust management system in VANETs typically falls into one of two categories: centralized or distributed. Our solution is a hybrid system which merges the two canonical designs of a centralized and distributed structure that utilizes to capabilities of both systems. In this paper we provide...
Passive attacks have caused a great threat to Wireless Sensor Networks (WSN), therefore the research of communication nodes and the stealthiness of communication relationship is crucial. Due to the problem of node hidden mechanism, a secure anonymous routing named Node-Uncorrelated Pseudonym Pairwise Mechanism (NUCPP) is proposed in this paper. Instead of using the traditional pseudonym node correlation...
4G communication systems provide a global communication standard for each and every communication facilities and internet and telecommunication service providers of the globe. The major attraction of 4G is the network selection policy which enables users to select services offered by the best of the various service providers. The main purpose of this paper is to discuss network selection in 4G systems...
This paper reviews a range of problems in the road transport field and the potential role of vehicular ad-hoc network systems (VANETs) in helping to solve them. In reality, the communications requirements vary widely from one application to the next, in terms of range, latency, and connectivity together with vehicle and roadside hardware. Based on the nature of the wireless channel, this presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.