The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the security of the Athens wireless metropolitan network (AWMN), which is an established autonomous network. More specifically, it presents and analyzes the possible security attacks that threaten AWMN, its users and the provided services. Attempting to counteract these attacks and the related risks, we study and evaluate the application of known security measures in AWMN that...
In a mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data transmission process. The higher the numbers of nodes that trust each other in the network means the higher successful communication process rates could be expected. To determine trust, there are several criteria need to be considered. These criteria...
An Ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure, so they are vulnerable to many attacks and the security of the network can not be ensued. In this paper, we present a novel Intrusion Detection Mechanism based on the Trust Model (IDMTM) for mobile Ad hoc networks. In IDMTM, we...
In this paper the authors propose a cross-layer security management plane, with a main actor security, privacy and trust manager, which addresses: a) the defined requirements taking into account the diverse application spaces and their scenarios, b) the diverse node capabilities which is a characteristic for wireless sensor networks architecture and c) the change of the context and preferences of...
Personal Networks - is prominent network architecture in realization of the next generation wireless communication systems due its built-in user-centriness. As end-users most often desire control, having strong privacy constrains and technology-oriented approaches are not often usable. The engineers should think their solutions as a white box, not as a black-box solution, of which the end-user sees...
Wireless sensor networks (WSNs), which consist of spatially distributed autonomous sensing and computing devices to monitor physical conditions such as temperature and motion. Under a hostile military environment, sensor networks can be easily attacked by malicious nodes and hostile nodes using the natural cooperation of WSNs. In this paper, we introduce the trust mechanism in the human society into...
Almost all of reputation systems for P2P applications are purely decentralized, trust management is complicated and convergence speed of trust in node is slow; even in most of them cost of network is overwhelming due to adopt broadcast searching mechanism. We present a partially decentralized time- sensitive reputation management model that has several advantages. Trust evaluator can define the valid...
Peer-to-peer (P2P) overlay networks are currently being used to build large scale distributed systems running various decentralized applications like distributed storage, content distribution, collaborative scheduling, and leader election. Although we have protocols like Byzantine agreement, voting schemes etc. for building resilient distributed applications; we have very few solutions available for...
Today, companies called service providers enable communications and control the related infrastructures. However, with increased computing power, advanced wireless technologies and more standardized terminals, users in the future will be able to take more control of communications. In this paper, we define and discuss a disruptive communication model called user-assisted communications (UAC), which...
The propagation of ubiquitous computing is bringing in an environment, where multitudes of diverse entities interact with each other. It is widely acknowledged that traditional security measures do not scale well in environments which are epitomized by unforeseen circumstances, unexpected interactions, and unknown entities. We propose the trust based security architecture based on the human notion...
Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, range from managing the outburst of user identities to protecting user interests as well as business interests. This paper proposes a framework for network identity management on the Internet that addresses these issues from a...
Ad-hoc networks, due to their improvised nature, are frequently established in insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. Ad-hoc on-demand distance vector (AODV) is one of the widely...
Groupware applications require secure communication and group-management services. Participants in such applications may have divergent interests and may not fully trust each other. The services provided must then be designed to tolerate possibly misbehaving participants. Enclaves is a software framework for building such group applications. We discuss how the protocols used by Enclaves can be modified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.