The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, some users can calculate the keys along the path from their own point to root by themselves, and during a departure procedure, one user is selected...
In P2P file sharing, problems can occur due to harmful content distributed by malicious peers and many solutions using reputation management have been proposed. However, none of these solutions are effective in relay-transfer P2P file sharing where a peer automatically relays content and creates content caches. This is because all the existing solutions only allow an evaluation of the peers without...
The current routing system has been facing serious scalability problem, mobility supporting issue, multi-homing and traffic engineering supporting issue, and provider lock-in problem. Locator/identifier split idea is considered as a promising way to solve the mentioned issue. However, how to design a proper framework for identifier-based routing in the locator/identifier split context is still an...
In this paper we address the issue of scalability in RFID pseudonym protocols. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose...
Currently most Web services architectures adopt RPC as their architectural style. But because of the complexity of RPC, there are bottlenecks of RPC-style Web services in Web-scale applications. REST not only can make full use of Web features, but also has the advantage of simplicity. So REST becomes a new alternative to RPC for Web services architecture. In this paper, at first the brief introductions...
MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) has been proposed to address the naming and addressing challenges for NGI (next generation Internet), we present several design enhancements for MILSA which include a hybrid architectural design that combines "core-edge separation approach" and "split approach", a security-enabled and logically oriented...
In this paper we propose an IP traceback mechanism based on deterministic packet marking and logging, using protected nodes set to reduce logged data amount. The proposed scheme exploits the fact that the number of nodes that may be under attack is usually limited to a small fraction of total nodes in the Internet, greatly reducing storage requirements by logging only the traffic destined to this...
Secure private networking over the Internet is difficult especially when trying to form a new network with private servers and hosts that belong to different administrative domains. Although such form of private network is useful as a closed group communication environment, simply applying existing VPN technologies is not sufficient. Not to mention common problems such as NAT and firewall traversal,...
Today's Internet is facing routing scalability issues, which could degrade network performance seriously. To solve that, several solutions are currently being discussed. Among them, one promising approach is to set up a new architecture which separates the locator and the identifier roles of current IP addresses. A key question for the solution is how to provide an efficient and reliable service for...
Network administrators must not only consider the vulnerabilities on each individual machine, but also how those vulnerabilities interact in a networked environment. Attack graphs are a tool to determine these interactions. They allow an administrator to visualize paths an attacker may take to compromise the network. Two critical issues that are often overlooked in analyzing attack graphs are the...
With the growth of internet, many network applications are relied on group communication model. To provide confidentiality for the communication between group members, a secret key called group key is used. Since the group is dynamic, whenever there is a membership change (join/leave), group key is changed (rekeying) to provide forward and backward confidentiality. The hierarchical key-tree approach...
In the last few years, P2P systems have rapidly evolved and emerged as a promising platform to deploy new applications and services in the Internet. The main reasons for this is that P2P systems are self-organizing, have a decentralized nature, good scalability, efficient query search, and good resilience in the presence of node failures. However malicious faults (attacks) are serious threats in these...
Although Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved problems and new options yet to be defined. One example of such case is Fully Qualified Domain Name (FQDN) option, which final version has been published in late 2007...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.