Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
With the dawn of a new era, digital security has become one of the most essential part of any network. Be it a physical network, virtual network or social network, the demand for secure data transmission is ever increasing. Wireless mesh networks also stand the same test of security as the legacy networks. This paper presents a secure version of the Geo-Location Oriented Routing (GLOR) protocol for...
In the age of Big Data, advances in distributed technologies and cloud storage services provide highly efficient and cost-effective solutions to large scale data storage and management. Supporting self-emerging data using clouds is a challenging problem. While straight-forward centralized approaches provide a basic solution to the problem, unfortunately they are limited to a single point of trust...
We introduce μDTNSec, the first fully-implemented security layer for Delay/Disruption-Tolerant Networks (DTN) on microcontrollers. It provides protection against eavesdropping and Man-in-the-Middle attacks that are especially easy in these networks. Following the Store-Carry-Forward principle of DTNs, an attacker can simply place itself on the route between source and destination. Our design consists...
The purpose of this work is to promote an improvement of backbone networks in terms of availability and remote access. It especially focuses on network environments based on a hub and spoke topology. The significant findings indicate that data isolation, data encryption and encrypted dynamic routing information transmission are the main requirements for backbone network security. In addition, due...
Cloud infrastructure providers allow multiple services to be hosted on a shared physical infrastructure. In a typical virtualized and multi-tenant environment, the cloud infrastructure and the hosted cloud services are managed by different administrative entities that may not trust each other. In such a scenario, the cloud service providers might hesitate to disclose operational information to the...
The tremendous popularity of Online Social Networks (OSNs), such as Facebook and Google+, has accustomed people to an easy and reliable process of social interactions. Inherently, the huge amount of information disseminated and the sensitive information possessed by OSNs prompted several privacy concerns. In order to increase the privacy of OSNs users, several solutions proposed the use of encryption...
Wireless Ad-Hoc Sensor networks have a wide variety of applications, including surveillance of critical infrastructure, safety monitoring, and many health-care applications. There is a need for secure communication as sensor networks are mostly deployed in such security and safety critical environments. Previous security mechanisms focus primarily on denial of service communication at the routing...
Mobile content dissemination is very useful for many mobile applications in delay tolerant networks (DTNs), like instant messaging, file sharing, and advertisement dissemination, etc. Recently, social-based approaches, which attempt to exploit social behaviors of DTN users to forward time-insensitive data, such as family photos and friends' sightseeing video clips, have attracted intensive attentions...
Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the overall security. In this...
The code dissemination in sensor networks is a useful technology to update a new code or change the functionality or bugs of the existing code. However, sensor networks are susceptible to various attacks because they are deployed in open and unprotected environments. It is necessary to use effective mechanisms to protect sensor nodes against attacks. In this paper, we propose a secure code dissemination...
The challenges thrown by wireless sensor networks (WSNs) are unique given their delicate architecture and scant resources. Even though security for wireless networks has been a widely researched area for many decades, security for WSNs is still a major roadblock for their efficiency and performance. This is due to the tussle of how much resources can be expended for security in proportion to the sensor...
Managing communication in pervasive environments is a difficult challenge because of characteristics such as: no central server and frequent disconnections. Furthermore, services to be composed for coordination are sometimes distributed in multiple networks. In that case, intermediate nodes linking these networks have to route communication data toward appropriate destinations. However, incorporating...
The concept of transition from IPv4/IPv6 network is currently being extensively studied to gain high level compatibility for easy, independent deployment ofIPv6. The transition between IPv4 and IPv6 internet will be a very long process as they are completely incompatible two protocols. IPv6 offers various features including Larger addressing capacity and capabilities, QoS control, encryption and decryption,...
Crowds, which is a classical P2P anonymous communication protocol, adopts random forwarding to effectively provide a privacy preserving way of accessing the web with good expansibility, without web sites being able to recognize who is browsing. However, it does not provide anonymity against global eavesdroppers. Furthermore, recipient anonymity and relationship anonymity are not implemented by Crowds...
One of the main privacy problems in network communication is lack of anonymity. Much work has been done on this problem in recent years. However, it is a challenge to improve anti-attack ability and degree of anonymity. A new anonymous multiplexing communication protocol, based on IPv6, is proposed in this paper. It utilizes the secret sharing technique to establish multiplexing communication, solves...
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should provide. At the same time, corporate computers offer spare disk space and unused networking resources. In this paper, we propose an intrusion-tolerant cooperative backup system that provides a reliable collaborative backup...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.