The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Cyber-Physical Systems can be harmed through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical spaces characterizing a system operating environment. Awareness of the topology...
We present an approach to dynamically reconfigure the network in the Internet of Things. The approach leverages the new enabling technologies from the Software Defined Networks, and provides a network controller capable to interact with the network switches, to detect faults, and to issue a new network setup. The network setup is defined as the set of communication flows and their associated forwarding...
In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover...
Now a days usage of Wireless Sensor Networks (WSNs) is increasing, because of its wide application. Unlike common networks the WSNs have the capability of reconfiguration, whenever any defect occurs in the network. However, while routing in these network the loss of data is occurring due to its security lack. Hence many researchers have presented their research for providing secure routing in WSNs...
Wireless Sensor Network solve the problem of various applications like military, nuclear power plant. This type of application required continuous monitoring, hence security is required for such network. WSN is affected by many attacks, wormhole and selective forwarding attacks are of them. In selective forwarding attack, attacker may refeuse or forward certain messages and simply drop them. In wormhole...
In the last decade, networks-on-chip (NoC) were proposed as a potential solution to alleviate interconnect challenges posed by bus- or crossbar-based interconnects. In this context, the principal NoC challenges have been for several years on designing reliable and efficient NoC architectures. Today, NoC have found their way on several commercial applications and products indeed, but recently they...
Software-Defined Networking (SDN) allows scalable and flexible network management without requiring expensive hardware changes. However, this technology is relatively new and creates novel security risks. In this paper, we investigate the vulnerability of link discovery service in SDN controller, which is a critical service provided by the control layer for the proper functioning of applications and...
Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess...
In SDN (Software-Defined Networks), applications are granted the ability to control and manage networks, such as routing, access control, and load balance, which is considered one of the most significant characters of SDN. However, these concurrent applications are lack of interactions when they operate on overlapping portions of the traffic and introduce a critical challenge of potentially conflicting...
The system reliability of Tier 4 or Class F4 or DC Category D can be derived by calculated probability density function (pdf), mean time between failures (MTBF), mean time to repair (MTTR), and failure rate (λ) of component statistical reliability, from IEEE 493, to availability of data center. Since, data center standards, Uptime Tier Classification, TIA-942, BICSI 002, BITKOM, and EN 50600, are...
Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has been proposed. It presents worms attacks. Latest network security technologies are investigated, the current situation and increasing demand for robust network security is analyzed. For...
Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resource-demanding, we can not give for granted that it can be computed in real time at every change...
Linear network coding (LNC) is a promising technology that can increase network throughput, improve transmission robustness and provide data confidentiality. In this paper, we investigate the optimal transmission topology construction and LNC design for secure multicast, i.e., the Integer Secure Multicast (ISM) problem. The ISM problem aims to find the transmission topology with integral link rates...
Abstract- A number of challenges are facing the design of secure datacenter environments, such as applications high throughput requirements, low latency applications, scalability, ability to detect Advanced Persistent Threats (APT), bring your own device (BYOD), and protection against Distributed denial of service (DDOS) attacks. Software Defined networking (SDN) is an emerging paradigm that provides...
In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to designing a range of security policies that are relevant for SDN services and communications. The design of a security architecture that enables secure routing of packets based on the specified security policies...
Vehicular ad-hoc networks (VANETs) have gained a lot of attention from both academic and industry due to its immense potential in revolutionizing the vehicular communication industry. VANETs facilitate vehicles to share safety and non-safety information through messages. Safety information includes road accidents, natural hazards, road blocks etc. Non-safety information includes tolling information,...
The “Regulation on the Emergency Response, Investigation and Handling of Electric Power Security Accidents”, based on load-shedding proportion, namely the Decree No.599 of the State Council of the People's Republic of China, was implemented on September 1st, 2011, which proposed new more stringent requests for power system reliability and security. Combining with related regulations on the Decree...
With the rapid development in recent decades, the electric power communication network plays a more and more important role and needs to meet the requirements of higher reliability. But the increase of network scale heightens the risk of failure. In order to guarantee the operation of electric power communication network safely and reliably, the complex network theory is used to evaluate the topology...
In Wireless Mesh Networks (WMNs), many applications are based on broadcast, such as the public security information, weather forecast and live show for users. Besides, broadcast is also a fundamental component of network protocols. Many broadcast approaches has been proposed like flooding and node-based CDS(N-CDS) scheme, but few have promising performance when used in multi-channel scenarios. In...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.