The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) is one of the basic requirements for the realization of Internet of Things (IoT). It is an automatic identification technology, without contact, aiming to identify the tag signal, in order to collect and send data instructions to the controller. Nevertheless, security is a very crucial issue for these RFID tags, since they suffer from a large number of threats...
Counterfeiting or surreptitious modification of electronic systems is of increasing concern, particularly for critical infrastructure and national security systems. Such systems include avionics, medical devices, military systems, and utility infrastructure. We present experimental results from an approach to uniquely identify printed circuit boards (PCBs) on the basis of device unique variations...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
Cloud computing enables the outsourcing of big data analytics, where a third-party server is responsible for data management and processing. In this paper, we consider the outsourcing model in which a third-party server provides record matching as a service. In particular, given a target record, the service provider returns all records from the outsourced dataset that match the target according to...
Ethernet Data Encryption devices (EDEs) are specified in this amendment. An EDE is a two-port bridge that uses MACsec to provide secure connectivity for attached customer bridges, or for attached provider bridges. EDEs may allow the customer (or provider) bridges to continue to use a VLAN Identifier (VID) in transmitted frames to select (as already specified in IEEE Std 802.1Q(TM)) between provider...
Cloud computing allows not only to obtain computing resources on-demand but also to store large amounts of data (big data) with a high level of fault tolerance. Nevertheless, data confidentiality for users of hybrid and public clouds is cannot guaranteed in full. Cloud providers have full access to user data, which threatens to compromise the integrity of data. Existing methods of providing security...
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there...
Cloud computing is a sort of computing that is contingent on distribution computing resources preceding having innate servers or specific plans to knob applications. In the cloud computing Cloud storage avoids the need to buy storage and also allows user to access broad range of application and resources immediately, which are hosted by others. But difficulty is our data security is not grauntaneed...
Chameleon authentication tree (CAT) is an important authenticated data structure for verifiable data streaming in 5G networks. But the typical CAT cannot support the dynamic scenario very well because it cannot expend freely since its height is fixed. Therefore, we proposed a dynamic CAT (DCAT) with the feature of adaptive expansion. We divided the algorithms of the DCAT with the following phases:...
The Internet-of-Things (IoT) is an innovation of sharing and exchanging data with both homogeneous and heterogeneous devices without an interjection and assistance of human beings. This innovation forms and transmits different types of information to diverse systems but keeps the threats of data exploitation, control, and misrepresentation. In addition, the security weakness of IoT has expanded significantly...
This article focuses on the knowledge of the technique Pentesting on web applications, discusses the different phases, most common of these attacks can be victims as well as upgrades software tools to make a penetration test- or Pentesting.
The objective of this paper is to understand cryptography & security implementation in industries, under network computing environment, it may be a manufacturing, Service, Media, Finance or any other industries to keep their Network computing environment safe & secure so that the relevant information, like finance data, management data Organizational Data, Business data, strategical data can...
As the exchange of Electronic Health Records (EHRs) among different healthcare providers has become a point of interest, it poses serious security and privacy concerns. Previous work proposed to offer medical information exchange has been partially secure, expensive (in terms of messages exchanged), and sometimes requires special hardware, like smart cards, to be present with the users. In this paper,...
Therapidly expanding use of the Internet for individual-driven needs coupled with the emergence of IoT devices calls for an identity management solution that opens-up closed systems to qualify users and devices securely anywhere on the Internet. This paper attempts to provide an objective overview of a user-centric identity and access management solution for securing the IoT devices that can help...
Security has historically not been a top consideration for the developers of time synchronization protocols. However, in recent years rising awareness of the overall importance of security in general along with increasing examples of targeted vulnerability analysis and incidents exploiting the underlying weaknesses of existing solutions has increased the demand for standards based security mechanisms...
Mobility as a Service takes the concept of XaaS to transportation: a MaaS provider shall merge transport options from different mobility providers, seamlessly handling the whole experience of traveling, from providing information, to travel planning, and payments handling. To effectively support the creation of a market of MaaS providers, we envision the creation of ICT infrastructures based on microservices,...
Safety is a real concern for computer systems. Many mechanisms have been trialed, among which the Diffie-Hellman (DH). Though DH has been effective to some extent, flaws have been detected and even alternatives have been proposed. It is within this framework that a new model has been designed-the S-WANE model. Various researches have validated this model. In the present work, we carry out a comparative...
The paper proposes a short comparative analysis of the contemporary models of public key infrastructure (PKI) as base of the cloud trust. The Russian model of PKI is presented. Differences between the North American and West Europe models of PKI and Russian model of PKI are described. The problems of creation and main directions of further development and improvement of the Russian PKI and its integration...
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication...
Vehicular ad-hoc networks (VANETs) are the most hopeful approach to provide safety information and other infotainment applications to both drivers and passengers. VANETs are formed by intelligent vehicles equipped with On Board Units and wireless communication devices. Hence, VANETs become a key component of the intelligent transport system. Even though VANETs are used in enormous number of applications,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.