The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Communication is an inevitable part of Smart Home domain. A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET suffers from both kinds of attacks, active and passive attacks at all the layers of the network model. The lacks of security measures of routing protocols allow attackers to intrude the...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
Software Defined Networking (SDN) has recently emerged as a new networking technology offering an unprecedented programmability that allows network operators to dynamically configure and manage their infrastructures. The main idea of SDN is to move the control plane into a central controller that is in charge of taking all routing decisions in the network. However, despite all the advantages offered...
Communication through the Internet raises privacy and confidentiality concerns. Protocols such as HTTPS may be used to protect the communication, but occasionally vulnerabilities that may allow snooping on packet content are discovered. To address this issue, we present MACHETE, an application-layer multi-path communication mechanism that provides additional confidentiality by splitting data streams...
The Border Gateway Protocol (BGP) plays a critical role in the Internet providing connectivity to hosts across the world. Unfortunately, due to its limited security, attackers can hijack traffic by generating invalid routes. Some detection systems for route hijacking have been presented, but they require non-public information, high resources, or can easily be circumvented by attackers. We propose...
The for equipment system of the complex network of command system of special structure and function, respectively from unit layer, sub network layer and network layer extraction reliability evaluation parameters, based on sub network efficiency established perception subnet, accused of subnet and combat the reliability index of the network and maintenance network, and each sub network reliability...
Studies of inter-domain routing in the Internet have highlighted the complex and dynamic nature of connectivity changes that take place daily on a global scale. The ability to assess and identify normal, malicious, irregular and unexpected behaviors in routing update streams is important in daily network and security operations. In this paper we describe Bigfoot, a Border Gateway Protocol (BGP) update...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
The security routing protocols practiced in a wireless sensor network are not enough to thwart the potential security breaches in heterogeneous wireless sensor networks. After reviewing the existing research methodologies to resist the adversaries, it was found that existing techniques are either computationally expensive process or lead to communication overhead. Therefore, this paper presents a...
Vehicular ad-hoc network is growing area of research because of it's infrastructure and highly moving scenario. This network provide intelligence transporation system for users so that movement is going to be easy. In this paper we study about Vehicular network and it's application. In our proposed work we apply clustering approach on the basis of density and moveability, neighbor selection happen...
The main objective of this paper is to improve the performance of MANETs with high immunity towards network attacks Grey Hole Attackers and Black Hole Attackers. In the clustered network if the elected cluster node [2] itself becomes a malicious node or selfish node, then the performance of data communication reduces. Hence the security of cluster head is necessary. Here nodes are selected conceding...
Node Security is very important because there are many kinds of node behavior coexisting in an unknown network. Most of node trust evaluation existing is based on energy element and communication element, which is not sufficient to describe behavior security of a node. This paper evaluates node trust value by the node behavior effect on network security. It presents behavior cognition parameters and...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
Border Gateway Protocol (BGP) takes the critical role in conveying routing information between thousand AS numbers in the internet network today. Therefore, this routing protocol is highly vulnerable to security issues that can devastate the internet itself.
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
Opportunistic Routing (OR) protocols are known as a promising research area with the aim of delivering data packets to their destination more reliably. Security of such protocols, however, is still an open, and challenging research problem. In this paper, we propose an enhancement on OR protocols which benefits from an appropriate candidate coordination mechanism, and assists in salvaging data packets...
Network operators rely on security services to protect their IT infrastructures. Different kinds of network security policies are defined globally and distributed among multiple security middleboxes deployed in networks. However, due to the complexity of security policy, it is inefficient to directly employ existing path-wise enforcement approaches. This paper models the enforcement of network security...
Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for...
Mobile Ad-hoc networks (MANETs) are self-organizing multi-hop wireless networks composed of independent mobile nodes. Due to the characteristics of dynamic topology and limited resources, MANETs are vulnerable to attacks from malicious nodes. However, traditional security policies with encryption and authentication cannot be well suited for MANETs, because of absence of trusted third party. In order...
In this paper, we address several security issues in our previously proposed content retrieval scheme for Disruption Tolerant Networks (DTNs). The content retrieval is built upon the social-tie relationships among DTN nodes for routing and content lookup service placement. Malicious nodes can launch attacks by advertising falsified social-tie information to attract and drop packets intended for other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.