The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interplanetary Network defines the architecture and protocols necessary to permit inter-operation of the Internet residents or systems on earth/spacecrafts with other remotely located Internet resident/systems on other systems/spacecrafts in transit in the hostile and unpredictable environment of space. Inter-networking in such environment requires new techniques other than traditional communication...
There is an enormous growth of the use of mobile devices and the social Web. Thus the users want to exchange their social data easily by using their phones and PDAs. We show that existing solutions put the users at security and privacy risks. Then, we describe our protocol for exchanging users' social data. We demonstrate that enables better security and privacy for exchanging social data. In addition...
This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers),...
Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utilize infrastructure protocols that are susceptible to manipulation; and rely on noisy, intermittent wireless communications. Mobile Ad-hoc Networks (MANETs) are networks constructed to operate not only in stable environments...
In December 2009, after years of planning, preparations and extensive infrastructure deployment, the world's first regional-scale underwater ocean observatory was open for business. NEPTUNE Canada opened its instrument network and data archive to free and open access by anyone willing to register for an account. Thus, we have embarked on a journey to transform our observatory into an online platform...
Rigorously trusted services depend on reliable evidences to describe and check service behaviors. In this paper, we propose the pi-SOA framework, which delivers mutually trusted services in a rigorous way. The framework allows clients to verify service behaviors remotely according to their trust policies and uniquely identify the verified service at all times during its executions. On the other hand,...
The mobile agent is a computer program that can move between different hosts in heterogeneous networks. This paradigm is advantageous for distributed systems implementation, especially in mobile computing application characterized by low bandwidth, high latency and unreliable networks connections. Mobile agent is also attractive for distributed transactions applications. Although mobile agent has...
Any endpoint with network connection may be our workbench as new computing models like cloud computing arise. We've designed a protocol to establish the user's trust in public endpoints covering hardware, firmware as well as software components. Three parties are involved for trust establishment: the user with a chip (MTPCM) to actively measure the platform, the endpoint owners who offer the platforms...
Aiming at the web attacks, this paper presented a program-based intrusion detection system to protect Web server based on the analysis of data source and intrusion detection technique. Then, it extended to the object of safety specification and data source so as to meet the requirements to protect Web server. In conclusion, as a new intrusion detection technology, it can be applied to detect attacks...
In recent years mobile transactions have attracted a large number of clients. Being a more convenient and secured approach to perform remote governmental transactions than Internet, mobile transaction has turned into a more appealing method than previous methods. However, implementing wireless communication technologies may result in more complicated information security issues. This paper discusses...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping...
We modified the multi-agent negotiation test-bed auction scheme which was proposed by Collins et al. In 2004, Jaiswal et al. have modified Collins's scheme, but Jaiswal's scheme still has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, collision between customers and a certain supplier. So the proposed protocol tries to reduce DOS attack and avoid replay data...
The family information technology has caught the attention of various industries such as IT, home appliances, communication, and real estate. Based on the home network theories, this paper describes a remote control system via Internet and GSM SMS, which controls smart home network in wired access mode and wireless communication mode, respectively. Although SMS is widely used for a variety of applications,...
In view of the current problems of HNIDS (high-speed network intrusion detection system), such as high packet loss rate, slow pace of testing for attacks and unbalanced data for detection. This paper presents a novel approach for HNIDS by taking two-stage strategy with load balancing model. In the on-line phase, the system captures the packets from network and split into small according the type of...
Despite the current Internets critical importance, portions of its architecture are still vulnerable to attacks ranging from malicious software exploits to denial-of-service (DoS). Most of these attacks and vulnerabilities experienced on the Internet today are due to the fact that the Internet architecture and its supporting protocols was primarily designed for a benign and trustworthy environment,...
Research on secure multi-party computation is of great interest in the field of information security. To determine convex hull algorithm for planar point set or polygons may be applied in a large number of research fields, and at present, there are a lot of methods to solve this problem. In this paper, a protocol is schemed out to determine a line by two secret points. The method is applied to determine...
We have developed Distributed, Voter Verified, Secret Ballot Voting (DVVSB), a potentially remote voting system that allows a voter to directly verify that their votes are in the final database of tallied votes. DVVSB meets key requirements of voting systems, such as voter anonymity and prevention of various vote insertion attacks, e.g., voting more than once or voting for others. DVVSB is also resistant...
Electronic auction allows bidders to bid for diverse sold objects under an electronic platform via Internet. Recently, Liaw et al. proposed an electronic online bidding auction protocol with both security and efficiency. However, we find some controversies in Liaw et al.'s scheme and then a new electronic auction protocol will be proposed to solve these controversies in this paper. In the proposed...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed...
This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted [20]. The security of votes depends on multiple servers such that each vote is divided into partitions and these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.