The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article shows a Bluetooth technology that has interesting applications for home and buildings; it could be also extended to any security system or access control points (e.g., garages). Design has been build up following a hierarchical scheme, starting from a simple and functional module and adding new features that will provide added value to final product. This will allow having a full product...
With the fast development of wireless network, the problems on wireless security have become more and more prominence. And technologies of firewall and intrusion detection cannot solve these problems satisfactorily. However, wireless intrusion prevention systems which can prevent attacks for WLAN excellently have become the research hotspot. In this paper, we firstly indicate the developing history...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
This paper presents the architecture of an integrated secure wireless ordering and transaction processing system. Wireless communication between the various system components is primarily done using WiFi technology. The ordering and subsequent transaction processing are done at the user end using a WiFi enabled PDA that communicates with a local server which in turn sends requests and receives confirmations...
To enhance access security capability of WiMAX (Worldwide Interoperability for Microwave Access), a trusted access scheme based on identity is proposed in this paper. It adopts trusted access architecture which includes three layers: identity layer, evaluation layer and authentication layer. Firstly, every entity is assigned only an identity in the identity layer; secondly, credible attribute of the...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
In this paper we present architecture of a middleware layer that enables users of mobile devices to seamlessly and securely access distributed resources in a grid. It lays the ground work for an application toolkit that addresses issues such as delegation of the job to the grid service, interaction with heterogeneous mobile devices, support for online processing, secure communication between the client...
Business delivery value added more via security services to the service providers and service users. Organization system developing various models to achieve the security system according to the modern development and technology; which they requires for their own operations and for their interactions within departments, customers and partners. Business securities pattern will be aid to establish a...
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to...
Sharing network bandwidth is significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprisepsilas confidential information. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
The explosive growth witnessed by wireless networks is largely due to the flexibility offered to both users and service provider. However, the open wireless medium makes traditional link-layer attacks readily available to anyone within the range of the network. Confidentiality, integrity and authentication pose several challenges to wireless network security implementations. The IEEE 802.11i security...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of security,...
Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of WMNs for their wide deployment and for supporting service-oriented applications. Despite the necessity, limited security research has been conducted...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
In this paper, we propose a secure embedded gateway system for a wireless sensor network that provides secure wireless and wire communication channels for wireless sensor nodes and applications in the Internet, respectively. It also has security functions such as key management, access control and secure wireless network configuration for wireless sensor nodes and secure query process for its applications...
Security is always a key concern for network operators. They are thus always looking for effective new security tools to work with. Eight years ago, an authentication technology called IEEE 802.1X was supposed to be an important tool for local area networks. 802.1X provides a security framework by letting PCs, Internet phones, and other devices connect to a LAN only if they can authenticate themselves...
Cognitive networks are intelligent networks that can automatically sense the environment and adapt the communication parameters accordingly. These types of networks have applications in dynamic spectrum access (DSA), co-existence of different wireless networks, interference management, etc. They are thought to drive the next generation of devices, protocols and applications. Clearly, the cognitive...
Open wireless networks raise privacy issues and entail increased risk of malicious attacks and illegal downloading activities. Such networks are nonetheless attractive-particularly to universities-because they enhance usability and thus expand access to nonsensitive system resources. At universities, such access brings numerous benefits to students, faculty, and the surrounding community alike. Here,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.