The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The reputation models based on distributed hash table are not suitable for unstructured P2P networks, whereas the existing reputation model for unstructured P2P networks requires a central server for assigning a set of trust management peers for any peer. We present a new reputation model for unstructured P2P networks in this paper. Differing from existing reputation models, in our model, each peer...
In wireless sensor networks (WSNs), secure data aggregation is an important application. Previous works are implemented by authentication among neighboring sensors. Considering that in many cases, data aggregation is both spatial and temporal correlation, this paper proposes a distributed and localized secure data aggregation algorithm based on behavior trust (BTDA). The security and reliability of...
A lot of efforts have been devoted to the analysis of network protocol specification for reliability and security properties using formal techniques. However, faults can also be introduced during system implementation; it is indispensable to detect protocol implementation flaws, yet due to the black-box nature of protocol implementation and the unavailability of protocol specification most of the...
Broadcast presents a special challenge for wireless sensor networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must be securely transmitted to all nodes, but this process is subject to attack by adversaries. For example, an adversary may try to waste the battery power of intermediate nodes by forcing a compromised node to repeatedly rebroadcast,...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
IP networks, composing the Internet, form a central part of the information infrastructure of the modern society. Integrated approaches to the assessment of their dependability are, however, only emerging. This paper presents three contributions for meeting this challenge. First, we propose an adaptation of the safety case methodology, a 'dependability case' approach, as a practical form of organizing...
In recent years, various routing protocols have been proposed for ad hoc networks. Most of these protocols are based upon simulation and security. These protocols still lack in terms of performance efficiency of routing protocols such as avoidance of route breaking, sensing of breakage in route, security and reliability (basically authentication of mobile hops in the real ad hoc networks. i.e. during...
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layers of network protocols. Two metrics are developed that characterize the overall system. A measure of probability of detection is derived using statistical inference techniques. A measure of reliability is developed as the...
An important aspect of homeland security is securing public buildings and places against intrusion. Wireless sensor networks (WSN) are an efficient means of detecting intrusion and extremely convenient to deploy in such situations. However, the software running on top of the sensor nodes that directly supports the alarm applications defined by the security forces needs to provide reliability, security...
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wireless networks is based on the authentication, authorization and accounting (AAA) framework where one or multiple identical and duplicated AAA servers are adopted to authenticate mobile users (MUs), handle authorization requests,...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. While peer-to-peer (P2P) networks are capable of recruiting a large number of participants, reliable anonymous communication in these architectures, with low bandwidth usage, still needs further investigation. This paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.