The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security threats in the Internet have been ever increasing, in number, type and means used for attacks. In the face of large-scale attacks, such as DDoS attacks, networks take unacceptable time to respond and mitigate the attacks, resulting in disruption to connections and the losses due to it. In this work, we look into the problem of dynamically mitigating attacks from the perspective of an ISP...
Industrial Control Systems (ICS) and their networking infrastructure have been the target of an increasing number of cyber-attacks over the past years. In 2015, researchers proposed to employ SDN techniques to improve the security of ICS networks. To avoid that all packets are forwarded along the same path in such a network, their multipath routing strategy alternates between several paths from a...
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
This work proposes a secure Network-on-Chip (NoC) approach, which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routing guarantees that the sensitive traffic communicates only through trusted nodes, which belong to a security zone. As the shape of the zones may change during operation, the sensitive traffic...
We present an analysis of how to determine security requirements for software that controls routing decisions in the distribution of discrete physical goods. Requirements are derived from stakeholder interests and threat scenarios. Three deployment scenarios are discussed: cloud and hybrid deployment as well as on-premise installation for legacy sites.
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Software Defined Networking (SDN) is a developing networking paradigm that advocates a complete overhaul of the conventional networking. SDN decouples the control logic from the data forwarding functionality; which traditionally are coupled on the network device. The coupling stifles innovation and evolution because the network often becomes rigid. Software Defined Wireless Sensor Networks (SDWSN)...
Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning play an important role in our society, give rise to systems that can manage themselves. WSNs have been used in various industrial applications, where reliability...
Internet of Things (IoT) is characterized by heterogeneous devices that interact with each other on a collaborative basis to fulfill a common goal. In this scenario, some of the deployed devices are expected to be constrained in terms of memory usage, power consumption and processing resources. To address the specific properties and constraints of such networks, a complete stack of standardized protocols...
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
The enhanced method of calculating the probability of message compromising in a communication network when using overlapping routes with series-parallel and combined structure are considered. A number of numerical examples have been used to analyze the influence on message compromising of security parameters belonging to certain elements (links) and fragments of the network. It is shown that the proposed...
Cognitive Radio (CR) is a technology that envisions the concurrence of legitimate and unauthorized users by permitting them to use the licensed bands and to avoid interference in process. As CR networks are growing rapidly with huge popularity but on the flip side, a number of challenges are being explored. The most common but the most important one of them is security, and it is the ultimate focus...
In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Low Power and Lossy Networks (LLN) are characterized by stringent energy constraints and frequent communication errors. Recent research in the area of LLNs has focused in solving many issues like security, energy efficiency, and routing. RPL is a new routing protocol proposed for LLNs by IETF ROLL group. RPL provides opportunities for improving overall performance of LLN by providing mechanisms for...
Being widely adopted by worldwide service providers, the MPLS technology to connect geographically separated customer sites becomes important in reliability. It is used to implement VPNs to connect the customer networks i.e., Inter-provider VPN network. In this project we first briefly describe VPNs which are behind the scope of secure private MPLS connections such as several VPN deployments emerged...
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
Low latency anonymity systems, like Tor and I2P, support private online communications, but offer limited protection against powerful adversaries with widespread eavesdropping capabilities. It is known that general-purpose communications, such as web and file transfer, are difficult to protect in that setting. However, online instant messaging only requires a low bandwidth and we show it to be amenable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.