The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security in routing is an important issue in vehicular ad hoc network (VANET) to protect the valuable information. However, this intelligent transportation system (ITS) services provided by VANET are affected by the malicious vehicles. In this study, a secure and intelligent routing (SIR) protocol is proposed to transmit the data in a quickest path through the authenticated vehicles. Sending the data...
In order to avoid data loss when user's mobile device is stolen or lost, users are encouraged to use mobile cloud storage to transfer and store the data from mobile terminals to the cloud as a means of data backup. Although various encryption mechanisms have been proposed to protect the security in cloud side by cloud service providers, the traditional cloud systems still cannot persuade the users...
In satellite communication networks, some malicious users may share illegal information. This communication makes the network be insecure. In order to cut off the illegal communication while maintaining the legal communications as many as possible, this paper propose a novel satellite communication security architecture. In this architecture, the satellites are divided into two layers. The satellites...
In this paper, the problem of resource allocation for OFDM user to guarantee secure communication is considered. There exists an active eavesdropper which is able to either eavesdrop or jam the ongoing information transmission of OFDM user but not both at the same time. The OFDM user aim is to minimize its transmit power over all subcarriers while maintaining its secrecy rate above a predefined threshold...
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
In Vehicular ad hoc networks, security and privacy are the major concerns. A single point of failure may cause great havoc in the network for safety related applications. In this paper, we analyse the recent trends in authentication and privacy preservation based on the signature size, verification time and anonymity. Our investigation shows that the id based signatures are suitable for VANET based...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
The following topics are dealt with: communication network; communication service; cognitive radio; protocols; security; ad hoc network; mesh network; all optical network; cellular network; network coding; resource allocation; wireless sensor network; and network performance.
Recently, As a android phone offers more superior functions and interface than an existing traditional phone, the number of user has been increased rapidly. But, the number of vulnerable android phone in security has been rising due to customizing the system of android phone for the convenience of user, there are many cases of customizing the system. Simultaneously a number of android phones which...
Last few years, vehicular network has been taken more attention of researchers and automotive industries due to life saving factor. Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. Attackers generate different attacks in this life saving vehicular network. In this paper, we propose five different classes...
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications...
Wireless mesh networks are the hybrid networks having infrastructure based gateways on one hand and on the other hand having mobile or fixed clients. Group communication is an important paradigm to study for its variety of applications such as video conferencing, broadcasting, online games, distance learning. Security is a critical issue in group communication. Mostly, group communication relies on...
Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge,...
This study approaches a two-dimensional rectangular plane figure mathematically in order to improve a calculating method for a numerical value concerning the volume of inflow information based on all related items such as the traditional traffic input ratio measurement method, the width of network broadband, and transfer speed, as an information flow; thus, it deduces a ratio formula that calculates...
Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely adopted especially by young adults. However, Bluetooth-enabled networks have similar security weaknesses as any other digital networks. Instilling security awareness and implementing preventive measures, responsibilities of both the device manufacturers...
With the mass deployment of the RFID system worldwide in recent years, the security concern of RFID system is becoming more and more important and pressing. However, one of the main standards of RFID technology, EPC Class-1 Generation-2 RFID standard has a very low security level, as analyzed in previous work such as. In this paper, we first have a brief review and fully security analysis of different...
Wiretap channel has caught a lot of attention recently in secured communications. A commonly adopted wiretap model is that the main channel is noiseless and the eavesdroppers channel is binary erasure channel (BEC). LDPC codes have been applied to achieve strong secrecy. However, it lacks design flexibility balancing on security and reliability, and cannot illustrate the fundamental tradeoffs among...
With the construction of 3G networks and the development of mobile internet, mobile service is updating quickly. Meanwhile, the mobile phone viruses became the next target. Mobile phone viruses are a destructive procedure, just like the computer virus (program), which is also infectious and destructive. This will constraint the development of the smart mobile phones. The study of the characteristics...
Over recent years the depth to which we have grown to rely on networked computer systems as part of the critical national infrastructure has become ever more apparent. Concern over difficulties caused by accidental failures has led to a realisation of the potential for damage that could be caused by targeted attacks and cyber warfare. Current approaches to addressing these problems have tended to...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.