The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Separation of network control from devices in Software Defined Network (SDN) allows for centralized implementation and management of security policies in a cloud computing environment. The ease of programmability also makes SDN a great platform implementation of various initiatives that involve application deployment, dynamic topology changes, and decentralized network management in a multi-tenant...
Mobile computing devices, industrial control systems, and service provider clouds often need to be connected to each other over wide area networks. However, reliability, quality of services and confidentiality are challenging in such setups. Moreover, isolated appliances and physical equipment face harsh environment conditions. In this paper we explore designing secure layer 2 overlay networks using...
Spontaneous network are called sometimes as accidental network formed by nodes which have mobility nature allocated in close proximity which connect to each other share resources and services. The creation of network with security concern is a point of issue in wireless network. The work aims to create network in secure manner. The updations of the nodes and further communication in the network to...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
As the power distribution grid moves towards actualizing the concept of a smart grid, the dependence of reliable and secure grid operation on the communication architecture and data is increasing rapidly, along with the possible cyber-attack surface. In this paper first an agreement algorithm for a distribution substation with radial topology is presented that leverages the communication capabilities...
In order to secure the Internet of Things, we have proposed to split connected devices into groups, called communities of devices. Each of those communities connects devices authorized to communicate with each other using a defined set of applications. To isolate information exchanged within each community, the network can be “sliced”, with each slice being dedicated to a community. However, such...
Software Defined Networking (SDN) is the new promise towards an easily configured and centrally controlled network. Based on this centralized control, SDN technology has proved its positive impact in the world of network communications from different aspects. Consistency in SDN, as in any rule-based network, is an essential feature that every communication system should possess. In this paper, we...
In this paper, a kind of topology attack with the objective to do greatest harm to the averaging consensus convergence rate is investigated from the perspective of the attackers. A dynamic programming method is provided to get the optimal attack strategy and it is proved that at each step the link with the corresponding two agents having the smallest sum of the degrees or having the maximum degree...
This paper introduces a concept for bringing dependability into the area of building automation. The proposed approach is able to extend existing building automation networks with dependability features. For this purpose, the communication stack of a particular system is extended by adding an intermediate layer. This so-called dependability layer is transparent to allow seamless integration. Thereby,...
Packet forwarding anomaly is an abnormal network state where flows are forwarded along wrong paths. Current practice of forwarding anomaly detection in Software Defined Networks (SDN) is achieved by sending probing packets or analyzing flow statistics. However, these approaches are not effective and efficient. For example, the probing approaches cannot capture all attacks, and the statistics approaches...
In recent years, the field of anonymity and traffic analysis have attracted much research interest. However, the analysis of subsequent dynamics of attack and defense, between an adversary using such topology information gleaned from traffic analysis to mount an attack, and defenders in a network, has recieved very little attention. Often an attacker tries to disconnect a network by destroying nodes...
The TCP/IP protocol suite has been designed to provide a simple, open communication infrastructure in an academic, collaborative environment. Therefore, the TCP/IP protocols are not able to provide the authentication, integrity, and privacy mechanisms to protect communication in a hostile environment. To solve these security problems, a number of application-level protocols have been designed and...
New market tools and distributed energy sources in present day transmission systems necessitate innovation in supporting information technologies. Existing tools used for power system operation evaluate individual power system snapshots but do not fully consider nearby regions in the operating space. Such tools may lead to market transactions, preventive actions, or corrective actions that are nominally...
Routing in open and decentralized networks relies on cooperation despite the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals. Living use cases for such environments are given by communitymesh networks due to their open structure and decentralized management and ownership. However, despite many active work in the field of routing security for mesh...
VANETs are a kind of adhoc wireless network, which is characterised as restricted topology patterns, node mobility and dynamic in nature. Vehicles communicate with each other via Vehicle-to-Vehicle (V-to-V), Vehicle to roadside unit (RSU) and RSU to Base-Station. Every vehicle is equiped with on board unit (OBU) that helps to communicate with RSU and Base-Station. Routing is very important in communication...
The Internet is often thought to be a model of resilience, due to a decentralised, organically-grown architecture. This paper puts this perception into perspective through the results of a security analysis of the Border Gateway Protocol (BGP) routing infrastructure. BGP is a fundamental Internet protocol and its intrinsic fragilities have been highlighted extensively in the literature. A seldom studied...
The execution-simulation gap (ESG) is a fundamental property of public physical unclonable function (PPUF), which exploits the time gap between direct IC execution and computer simulation. ESG needs to consider both advanced computing scheme, including parallel and approximate computing scheme, and IC physical realization. In this paper, we propose a novel PPUF design, whose execution is equivalent...
Many restructured power markets rely on Financial Transmission Rights (FTRs). FTRs are financial contracts that entitle the holder to a stream of revenues (or charges) based on the day-ahead hourly congestion price difference across an FTR related energy path. Holders obtain FTRs through an auction mechanism relying on the solution of a specially formulated OPF problem. FTR holders then receive or...
This paper investigates the eavesdropping attacks in underwater acoustic networks (UANets). In particular, we propose an analytical framework to model the eavesdropping attacks in UANets in terms of the eavesdropping probability. Results of extensive simulations match the analytical results, indicating the effectiveness and accuracy of our model. Besides, we also find that the eavesdropping probability...
This paper presents the longer term solutions for more safer flight control systems that's named as Fly-By-Sensors (FBS) control system. They often used for dominant associated observance of an in-flight functions, starting and landing, speech communications etc. and can be implemented on any air vehicle including remote-controlled Air Vehicles, Quad rotor, Aerial Vehicles, Drones, Jet air craft,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.