The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Mobile Ad Hoc Network (MANET) has become a key communication technology in various domains such as, military defense networks, disastrous and rescue operational command centers, vehicular networks, etc. The dynamic topology and open wireless communication medium may potentially introduce various security threats in MANET. The recent research on MANET focuses on developing security enforcement...
In mobile Ad hoc networks, data is transmitted in airspace between mobile entities without any centralized control. This environment offers many and very important services for mobile users. However, the level of security in this kind of network has not yet reached a significant level of maturity against the ferocious attacks. In this work, we present a new model to trust routing protocols communications...
Social Networking Sites (SNS) plays an integral role in modern life. This provides a platform to connect, to share and to transfer knowledge. Every user gives enough of individual information in their record, for example, name, age, gender, email-Id, phone number, current town, profession, educational details, movies, sports, likes and dislikes, current location and so forth. Some users (cyber predators)...
Cloud computing is a new computing model that involves outsourcing of computer technologies due to the lack of their availability in certain locations. However, when there is no previous experience between cloud service providers and their consumers, consumers often hold a degree of uncertainty about the reliability, quality and performance of the services being offered. This paper presents a survey...
The large scale deployment of the Internet of Things (IoT) increases the urgency to adequately address trust, security and privacy issues. We need to see the IoT as a collection of smart and interoperable objects that are part of our personal environment. These objects may be shared among or borrowed from users. In general, they will have only temporal associations with their users and their personal...
Moving towards a hyperconnected society in the forthcoming "zettabyte" era requires a trusted ICT infrastructure for sharing information and creating knowledge. To advance the efforts to build converged ICT services and reliable information infrastructures, ITU-T has recently started a work item on future trusted ICT infrastructures. In this paper, we introduce the concept of a social-cyber-physical...
In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for human-beings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based services...
The need for security systems and related ICT solutions poses new challenges to the individuals in terms of fundamental rights such as the right to privacy. Those challenges generate mistrust at the same time to the end-users. Standardisation and certification can have a significant role in changing the picture and help reinstate the lost confidence. This paper examines the concept of "trust"...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
In March and April, 2015, for the first time in the history of Nigeria, elections were conducted, using partial electronic voting means. Specifically, smart card readers were utilized for accreditation of prospective voters. While the 2015 election exercise was adjudged the best ever in the history of the country, it was not without challenges. One of these was the failure, in many instances, of the...
Trust plays an important role in the development and profitability of users in mobile commerce systems. In order to estimate the amount of trust, the variety of trust management systems have been proposed and implemented. One of the main challenges facing these systems is the types of attacks that threaten them and their impact on trust evaluation. In this paper, we studied four important attacks...
Virtual Machines hosted in cloud systems are susceptible to migration usually without notifying the cloud consumer. This is generally undertaken to load balance user requests across multiple data centres, often without direct awareness of the user. Migration could be to a regional site or to a data centre in another geographical area, i.e. to a country which has non-conforming laws with regards to...
With the increased numbers of mobile devices working in an ad hoc manner, there are many problems in secure routing protocols. Finding a path between source and destination faces more challenges in Mobile ad hoc network (MANET) environment because of the node movement and frequent topology changes, besides, the dependence on the intermediate nodes to relay packets. Therefore, trust technique is utilised...
Reputation systems are an emerging area of research in ad-hoc networks. They have been introduced as a security solution for nodes' misbehaving problem. A reputation system should cope with any kind of misbehavior. It enables honest nodes to make fair decisions about their neighbors. This may encourage nodes to behave well and cooperate in order to avoid being penalized or isolated. In this paper,...
A mobile ad-hoc network or MANET is a wireless, self-configuring and infrastructure-less mobile network. Due to its dynamic nature, secure routing is an inherent issue in a MANET. Cryptographic and trust based methods can be used to prevent attacks from malicious nodes in MANET. Cryptographic methods are computationally intensive and hence usually unfeasible for a low infrastructure network such as...
We are proposing a layered and scalable WAVE (Wireless Access for Vehicular Environments) security structure for VANET (Vehicular Ad hoc Network) network. The scalability and variable message delivery are provided by using both asymmetric and symmetric encryption algorithm. The whole region is divided into different security domains and the security related load of each domain is distributed evenly...
Nowadays, users' demands for tourism consumption continue to upgrade, more and more consumers complete the reservation of air tickets and hotels through online payment. Referring to previous researches, this paper established the users' online payment behavior intention model based on Unified Theory of Acceptance and Use of Technology (UTAUT) and put forward corresponding hypotheses. Then we adopt...
Online social networks have enabled communication, collaboration and information sharing in the healthcare domain. Despite the benefits offered by new healthcare social networking applications, there are many challenges. The unique trust and privacy requirements of healthcare make trust management an utmost important issue. In this paper, we propose a personalized self-managed trust model, MedTrust,...
It is estimated that by 2020 that the Internet of Things with embedded and wearable computing will have a major impact on society and be providing beneficial services in a wide variety of applications. It has already accomplished some cost savings in operations and increases in asset efficiency. Increased connectivity and improved safety, security, and reliability are expected to increase potential...
Wireless sensor network (WSN) is composed of tiny nodes. The nodes are deployed randomly over an area in order to sense various physical phenomena related parameters. The nodes sense the data within their vicinity and forward the data to the neighboring nodes so as to forward the data towards the base station. However, there may be few malicious nodes present in the network and these nodes falsify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.