The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is to create a model of secure wireless sensor network (WSN), which is able to defend against most of known network attacks and don't significantly reduce the energy power of sensor nodes (SN). We propose clustering as a way of network organization, which allows reducing energy consumption. Network Protection is based on the calculation of the trust level and the establishment of trusted...
Assessment is an important part of the learning process. The instructor should be able to evaluate whether a learner has acquired the knowledge and competences provided in the course. Moreover, assessment activities also help a learner to check his level of expertise. Typically, the assessment model and assessment activities of subjects in official programmes are the same for all the learners, since...
The concept of cloud computing enhances the on-demand network access expediently to share a pool of configurable resources. The major advantage of cloud computing has been accomplished by business organizations through the use of shared services, service-oriented architecture and virtualizations. Cloud computing is deployed by the third-party or web-based providers. Therefore, security component would...
Online Social networks are the best way of communication among users residing at different parts of the world. Users can share their videos, photos, posts etc. among their friends in blink of an eye. But every good thing comes with few bad aspects as well. Trust between any two users has always been an issue in OSNs. In this paper a system has been proposed for calculating trust between a user and...
Mobile social networks (MSNs) are specific types of social media which consolidate the ability of omnipresent connection for mobile users/devices to share user-centric data objects among interested users. Taking advantage of the characteristics of both social networks and opportunistic networks (OppNets), MSNs are capable of providing an efficient and effective mobile environment for users to access,...
Collaborative environments raise major challenges to secure them. These challenges increase when it comes to the domain of Enterprise-Social-Networks (ESNs) as ESNs aim to incorporate the social technologies in an organization setup while asserting greater control of information security. In this context, the security challenges have taken a new shape as an ESN may not be limited to the boundaries...
Social networks are used by millions of users every day and become part of our lives. However, privacy and security issues have been raised since user's sensitive information are exposed by several manners. User's sensitive information disclosure is not solved yet by current social networks. Thus several researches have been done in order to understand implications and users awareness. Different approaches...
Cloud computing is a promising technology and its adoption is increasing rapidly. Still, many potential cloud customers are concerned about the security, privacy, and availability of their data in the cloud as they have less control over it. Cloud certification authorities can perform rigorous and thorough testing based on the well-known security standards procedures and make the audit reports public...
Online review plays an important role when people are making decisions to purchase a product or service. It is shown that sellers can benefit from boosting their product review or downgrading their competitors' product review. Dishonest behavior on reviews can seriously affect both buyers and sellers. In this paper, we introduce a novel angle to detect dishonest reviews, called Equal Rating Opportunity...
The effective functioning of cybersecurity incident response teams (CSIRTs) is critical for the protection of digital information used by individuals and organizations around the world. However, because CSIRTs are a relatively new type of team, what is known about improving their effectiveness isn't as fully developed as it is for other teams with a richer research history. To improve the development...
Grid systems are an ideal basis to parallelise computationally intensive tasks that efficiently can be split into parts. One possible application domain for such systems is rendering of films. Since small companies and underground film producers do not have the possibility to maintain appropriate computing environments for their own films, grid-based approaches can be used to build a self-organised...
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control...
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and...
Recent developments in software defined networking have shed new light on how to control and manage an ad hoc wireless network. Given the wide deployment and availability of heterogeneous wireless technologies, the control and management of ad hoc wireless networks with the new software defined networking paradigm is offered more flexibility and opportunities to deal with trust and security issues...
Future Internet of Things (IoT) systems will connect the physical world into cyberspace everywhere and everything via billions of smart objects and are expected to have a high economic impact. To date there is little work on trust computation in IoT environments for security enhancement, especially for dealing with misbehaving owners of IoT devices that provide services to other IoT devices in the...
This paper proposes a novel quantitative trust model that supports both first-hand (direct) and second-hand (recommendation) trust opinion to calculate the final trust of each node in the network. In order to compute direct trust of a node, the proposed trust model utilizes the theory of ARMA/GARCH to predict the trust parameters and a probabilistic model to combine those parameters. The proposed...
Distributed cooperative spectrum sensing is an effective and feasible approach to detect primary users in Cognitive Radio Mobile Ad Hoc NETworks (CR-MANETs). However, due to the dynamic and interdependent characteristics of this approach, malicious attackers can interrupt the normal spectrum sensing more easily in open environments by spectrum sensing data falsification attacks. Meanwhile, attackers...
Internet of Things (IoT) technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in our personal life by means of smart devices at home. Such devices often interconnect with cloud services that promise easy usage and global access. However, managing the balance between trust in the service provider and need for privacy of individuals becomes a major challenge...
"Use the computer without a computer," this is the dream of all managers who believe in "Cloud Computing". The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume...
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.