The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article aims to build a misuse Wireless Local Area Network Intrusion Detection System (WIDS), and to discover some important fields in WLAN MAC-layer frame to differentiate the attackers from the legitimate devices. We tested several machine-learning algorithms, and found some promising ones to improve the accuracy and computation time on a public dataset. The best performing algorithms that...
Channel assignment is the key problem in the research of the next-generation wireless mesh networks (WMN) in which each node may be equipped with multiple radio interfaces, each capable of running in one of several modes and one of several channels. Recent research indicates that the use of channel assignment technology could reduce the interference and increase the throughout of WMN effectively....
Security audits and penetration testing exercises serve to determine the baseline of the security in a network/system and to identify possible avenues of exploitation. Red and Blue Team is the name given to the combined execution of these risk assessments that consist of various operational, managerial and technical activities. However, to successfully complete a combined Red and Blue Team Mission...
Wireless sensor networks (WSNs) have been deployed largely due to recent advances in wireless communication technologies. These sensors may be deployed in adverse or even hostile environments so they should consider security issues in their communications. In this paper we proposed sectorized location dependent key management (SLDK) based on Anjum's LDK algorithm in which generation of link securing...
Recently, several research contributions have justified that wireless communication is not only a security burden. Its unpredictable and erratic nature can also be turned against an adversary and used to augment conventional security protocols, especially key agreement. In this paper, we are inspired by promising studies on such key agreement schemes, yet aim for releasing some of their limiting assumptions...
Trust is an important issue when a wireless sensor network is used in the fields such as military surveillance and reconnaissance, emergency rescue, and intelligent residential district. Due to the restrictions of energy, resource, and computing power in the sensor nodes, the traditional secure solutions cannot be applied to the wireless sensor networks directly. In this paper, applying the concept...
Random key graphs are random graphs induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. For this class of random graphs we show the existence of a zero-one law for the appearance of triangles, and identify the corresponding critical scaling. This is done by applying the method of first and second moments to the number of triangles in the...
In this paper we focus on the survivability of wireless sensor network and develop a model to evaluate the tradeoffs between the cost of defense mechanisms for wireless sensor network and the resulting expected survivability after a network attack. We demonstrate the model through simulations its effectiveness in mitigating such attacks. Our analysis of the impact of these attacks versus the adversary's...
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats...
Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper, a scenario in which the relay is equipped with multiple antennas is considered...
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effectiveness and applicability of this prototype,we performed extensive experimental testing. We present a fully automated crawling framework that...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question ldquowhat are the link-level secrecy capacity gains from cooperation?rdquo, this paper attempts to answer the question...
When there is a need to compare the characteristics of several similar global communications systems, security is often an important factor to consider in the comparison. However, in most situations it is difficult to deduce whether a system is more secure than other; and it is even more difficult to deduce how much more secure a system is compared to another. This paper presents a method based on...
Mobile devices containing sensitive data are often misplaced or stolen. Often, the data on the device is misused for financial gains or is purposefully published to discredit a company or disgrace an individual. We present a system for reducing the risk of exposure of sensitive data on Microsoft Windows based mobile devices. The system introduces a continuous authentication scheme, where the device...
In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental...
Today, the demand for flexible, large-scale parking structures is increasing all over the globe. To enhance safety or to sustain development, dual-surveillance based supervisory control and data acquisition (SCADA) networks are modeled to be spatially integrated with a helix circulation pattern. Moreover, reliable wireless area communication is systematically organized to counter the effects of an...
Location information has been found useful in the design of key predistribution schemes in wireless sensor networks (WSNs). In this paper, a novel key management scheme based on location is proposed to enhance the security of the wireless sensor networks. We get the idea from the previous location-based key (LBK) scheme but here the location of a sensor node is described by its neighbors' logical...
According to circular range of antenna broadcasting, The usual shape of environment is circular, but most of companies and establishments have a quadrilateral region. In some applications like as military or research company, It is important that nobody out of region, can access to their network. In other word, network services must be valid only inside the region. There are some techniques to be...
The key feature for secure communication relies in the establishment of cryptographic keys. However, low processing devices like sensor nodes are unable to perform a good random number generator used for the key generation, neither are able to perform complex public key based operations. To address this problem, we consider using the measurements of per-packet signal to generate secret keys. Our generator...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.