The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In SDN (Software-Defined Networks), applications are granted the ability to control and manage networks, such as routing, access control, and load balance, which is considered one of the most significant characters of SDN. However, these concurrent applications are lack of interactions when they operate on overlapping portions of the traffic and introduce a critical challenge of potentially conflicting...
Logistics entities are interrelated to each other, any disruption or sudden unavailability of the entities may cause severe cascading disruption effects on the functioning of the entire logistics network. In analyze the cascading disruption effects, it is important to actively concern the normal logistics practices, rather than passively emphasize on learning from the past incidents. This paper proposes...
We present our thoughts on the design of a novel hybrid system for detecting anomalous traffic in large-scale, policy-rich data networks. A key innovation in our approach is the combination of static configuration analysis and dynamic traffic analytics. More specifically, we will first develop abstractions and mathematical models to formally model the network and security configurations to statically...
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralized infrastructure where each node can act as the source, destination and relay for traffic. MANET's are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilize fixed infrastructure except where connectivity to carrier networks is...
Inside MANET, mobile devices can move independently devoid of pre established infrastructure. In this type of network there is no fixed topology for the network. To increase the coverage range and to obtain the global type of services these MANETs can be joined to other type of networks. For combination of heterogeneous type of networks, intermediate one which is a gateway is used to form a hybrid...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
With the increasing use of Wireless Sensor Networks, the privacy of the user is of main concern. The sensors maintain a layer 2 address that lasts for the node lifetime. As a consequence, an eavesdropper can easy trace the user and his activities, even in case the nodes send ciphered traffic.We propose a 6LoWPAN-ND extension to improve privacy and overcome the traceability of the user. With our method...
Wireless Mesh Network is an emerging technology with great potential to become a Self-Sustained Network. Unlike the traditional networks that dominate the current communication system and rely on a large and expensive setup of wired/wireless access points to provide connection between users, the Wireless Mesh Network is formed by the user devices (referred as Nodes) which connect to each other to...
The routing, core allocation and spectrum assignment (RSA) problem in elastic optical networks with multi-core is a well-known NP-hard problem and the network information security is also an important problem in elastic optical networks. In this paper, we combine these two problems to investigate the routing, core allocation and spectrum assignment problem with the guaranteed secure level in elastic...
Large number of on-chip instruments support post-silicon validation, volume test, debug, diagnosis and in-field monitoring of an integrated circuit. The IEEE 1687-2014 (Internal JTAG or IJTAG) standard is an effective method for accessing the on-chip instruments. Streamlined access to on-chip instruments through IJTAG is prone to abuse and lead to security issues. An adversary can leak confidential...
Routing in cognitive radio networks (CRNs) faces many limitations that make it challenging. First, traditional routing protocols cannot be directly applied in CRNs because they consider fixed frequency band. Second, cognitive radio enables dynamic spectrum access which causes adverse effects on network performance. Third, effective routing in CR Networks (CRNs) needs local and continual knowledge...
Security threats against routing system have become both increasingly numerous and sophisticated recently. However, so far there is not a taxonomy that could be useful for the routing system security threats. In this paper, a clear-cut and scalable taxonomy faced to routing system security threats was proposed. It consisted of four basic dimensions which provided a holistic classification in order...
Numerous routing protocols have been designed and subjected to model checking and simulations. However, model checking the design or testing the simulator-based prototype of a protocol does not guarantee that the implementation is free of bugs and vulnerabilities. Testing implementations beyond their basic functionality (also known as adversarial testing) can increase protocol robustness. We focus...
Privacy is considered as one of the hottest issues in nowadays communication research areas. It focuses on protecting the content of the transmitted data and on preserving the contextual information such as the identity of the communicating entities. This paper presents an overview of research done in this area in order to build a foundation that helps the research community to understand more the...
Ensuring security in routing protocols designed for Internet of Things (IoT) is more challenging owing to the fact that devices are resource constrained. The need for lightweight security mechanisms is apparent because cryptography based mechanisms have intense computation requirements. Although Routing Protocol for Low power and lossy networks (RPL) inherently comprises a few security mechanisms,...
Wireless data communications commonly use public networks to exchange data packets. Public networks of rural area are lack of network infrastructure so it will inflict high delay for wireless communications. The rural areas are same with intermittent area that need a mechanism of data transfer to tolerate with delay. The Delay Tolerant Network (DTN) is a solution for data transmission in rural areas...
Software Defined Networking (SDN) is a paradigm shift that changes the working principals of IP networks by separating the control logic from routers and switches, and logically centralizing it within a controller. While having a centralized controller as a single point of failure creates an added vulnerability from a network security viewpoint, it also creates an opportunity to offer a whole range...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.