The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
With the dawn of a new era, digital security has become one of the most essential part of any network. Be it a physical network, virtual network or social network, the demand for secure data transmission is ever increasing. Wireless mesh networks also stand the same test of security as the legacy networks. This paper presents a secure version of the Geo-Location Oriented Routing (GLOR) protocol for...
In the age of Big Data, advances in distributed technologies and cloud storage services provide highly efficient and cost-effective solutions to large scale data storage and management. Supporting self-emerging data using clouds is a challenging problem. While straight-forward centralized approaches provide a basic solution to the problem, unfortunately they are limited to a single point of trust...
We introduce μDTNSec, the first fully-implemented security layer for Delay/Disruption-Tolerant Networks (DTN) on microcontrollers. It provides protection against eavesdropping and Man-in-the-Middle attacks that are especially easy in these networks. Following the Store-Carry-Forward principle of DTNs, an attacker can simply place itself on the route between source and destination. Our design consists...
The purpose of this work is to promote an improvement of backbone networks in terms of availability and remote access. It especially focuses on network environments based on a hub and spoke topology. The significant findings indicate that data isolation, data encryption and encrypted dynamic routing information transmission are the main requirements for backbone network security. In addition, due...
Cloud infrastructure providers allow multiple services to be hosted on a shared physical infrastructure. In a typical virtualized and multi-tenant environment, the cloud infrastructure and the hosted cloud services are managed by different administrative entities that may not trust each other. In such a scenario, the cloud service providers might hesitate to disclose operational information to the...
The tremendous popularity of Online Social Networks (OSNs), such as Facebook and Google+, has accustomed people to an easy and reliable process of social interactions. Inherently, the huge amount of information disseminated and the sensitive information possessed by OSNs prompted several privacy concerns. In order to increase the privacy of OSNs users, several solutions proposed the use of encryption...
Wireless Ad-Hoc Sensor networks have a wide variety of applications, including surveillance of critical infrastructure, safety monitoring, and many health-care applications. There is a need for secure communication as sensor networks are mostly deployed in such security and safety critical environments. Previous security mechanisms focus primarily on denial of service communication at the routing...
Mobile content dissemination is very useful for many mobile applications in delay tolerant networks (DTNs), like instant messaging, file sharing, and advertisement dissemination, etc. Recently, social-based approaches, which attempt to exploit social behaviors of DTN users to forward time-insensitive data, such as family photos and friends' sightseeing video clips, have attracted intensive attentions...
Traditional low-latency anonymization techniques apply non-standardized, complex, and often even proprietary protocols. Apart from poor performance, the high development effort leads to the existence of at most one single implementation. This in turn increases the risk of creating so-called software monocultures, where failures in the single implementation can compromise the overall security. In this...
The code dissemination in sensor networks is a useful technology to update a new code or change the functionality or bugs of the existing code. However, sensor networks are susceptible to various attacks because they are deployed in open and unprotected environments. It is necessary to use effective mechanisms to protect sensor nodes against attacks. In this paper, we propose a secure code dissemination...
The challenges thrown by wireless sensor networks (WSNs) are unique given their delicate architecture and scant resources. Even though security for wireless networks has been a widely researched area for many decades, security for WSNs is still a major roadblock for their efficiency and performance. This is due to the tussle of how much resources can be expended for security in proportion to the sensor...
Managing communication in pervasive environments is a difficult challenge because of characteristics such as: no central server and frequent disconnections. Furthermore, services to be composed for coordination are sometimes distributed in multiple networks. In that case, intermediate nodes linking these networks have to route communication data toward appropriate destinations. However, incorporating...
The concept of transition from IPv4/IPv6 network is currently being extensively studied to gain high level compatibility for easy, independent deployment ofIPv6. The transition between IPv4 and IPv6 internet will be a very long process as they are completely incompatible two protocols. IPv6 offers various features including Larger addressing capacity and capabilities, QoS control, encryption and decryption,...
Crowds, which is a classical P2P anonymous communication protocol, adopts random forwarding to effectively provide a privacy preserving way of accessing the web with good expansibility, without web sites being able to recognize who is browsing. However, it does not provide anonymity against global eavesdroppers. Furthermore, recipient anonymity and relationship anonymity are not implemented by Crowds...
One of the main privacy problems in network communication is lack of anonymity. Much work has been done on this problem in recent years. However, it is a challenge to improve anti-attack ability and degree of anonymity. A new anonymous multiplexing communication protocol, based on IPv6, is proposed in this paper. It utilizes the secret sharing technique to establish multiplexing communication, solves...
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should provide. At the same time, corporate computers offer spare disk space and unused networking resources. In this paper, we propose an intrusion-tolerant cooperative backup system that provides a reliable collaborative backup...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.