Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
As the core infrastructure of the VoIP, IMS and IPTV, SIP based network is now increasingly been deployed throughout the world. Due mainly to the relatively high flow rate and the exorbitant session maintenance, SIP servers are similarly susceptible to the Denial-of-Service (DoS) Attacks above the IP stack, especially when the Distributed spoofing URI is considered. A hybrid SIP DoS detection method...
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then,...
Vehicle chatting is one of the most promising applications in VANETs, which allows like-minded vehicles to chat on the topics of common interest on the road. However, there exist some newly emerging privacy challenging issues in vehicle chatting application, such as how to find a like-minded vehicle on the road and how to prevent one's interest privacy (IP) from others who are not like-minded? In...
The Session Initiation Protocol (SIP) has been widely used in VoIP for session control and management. As the basic SIP specifications do not require the proxy servers to track the states of established sessions, an extension header field "Session-Expires" has been proposed for SIP to allow the proxy server to hold resources for established sessions just within the specified periods. In...
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion...
Many security protocols are vulnerable to type flaw attacks, in which a protocol message may be forged from another message. The previous approaches focus on heuristic schemes to protect specific protocols but fail to expose the enabling factors of such attacks. In this paper, we investigate the relationship between the type flaw attacks on the security protocols and the knowledge of the principals...
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
The security concerns in 3G network, especially the core network, is far from being satisfied. As the most important protocol in the 3G core network, GPRS Tunnel Protocol (GTP) is quite vulnerable to attacks in the flat, full IP environment. Solving such a problem properly is very urgent and important for the operation of 3G network. In this paper, we discus the security issues in GTP, and propose...
Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discover that there exist some weaknesses in EKE protocol that is subjected to relay attacks based on the analysis...
Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utilize infrastructure protocols that are susceptible to manipulation; and rely on noisy, intermittent wireless communications. Mobile Ad-hoc Networks (MANETs) are networks constructed to operate not only in stable environments...
Within a mobile environment, communications may necessitate different security properties depending on the sensitivity of the data exchanged. A protocol such as HTTPS that uses the Secure Socket Layer/Transport Layer Security (SSL/TLS) may offer these properties, but it is known that SSL/TLS is high-energy consuming and the properties are provided as a block, which may have an important impact on...
The main goal of Cluster-based sensor networks is to decrease system delay and reduce energy consumption. LEACH is a cluster-based protocol for micro sensor networks which achieves energy-efficient, scalable routing and fair media access for sensor nodes. However, the election of a malicious or compromised sensor node as the cluster head is one the most significant breaches in cluster-based wireless...
This paper presents a scalable and flexible multi-core SoC architecture for high-speed key exchange for emerging IP security systems. Novel approaches are proposed for HMAC authentication block parallelization, distributed key handling and a pipelined block cipher design that allows feedback encryption modes. This improves upon previous state-of-the-art designs for IPSec, creating an architecture...
Host-based mobility and multi-homing protocols allow hosts to change their location or network interface during ongoing sessions in a cost-efficient, technology-agnostic manner. Since these solutions enjoy resurgence with the rise in mobile internet traffic, they are faced with the problem of providing sufficient security without impairing the economical benefits. We present a lightweight security...
In order to protect the privacy and the security of the tag, we propose a mutual authentication protocol for low-cost RFID system. The protocol ensures that the reader (or server) and the tag authenticate each other, provides the privacy and security properties for low-cost RFID system and also has good performance. The protocol resists almost all attacks except cloning attack, and achieves backward...
In this paper, a new method of safe, secure and efficient way of communication, Quantum Wireless Communication(QWC) is proposed, the security offered by a QWC channel and the different ways of communicating in QWC are also discussed. In terms of complexity, wireless medium has a lot of advantages than that of optical fibers since there are no birefringence effects in the free space. In addition, it...
In mobile ad hoc networks, the security enforcement and its implementation becoming increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication devices), no fixed network topology and more importantly absence of centralized authority. In such networks, communication links between nodes may be bandwidth constrained, messages typically roamed in multi-hoped fashion,...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed against HB ineffective. Based on the fact that there has been no passive...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.