The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
with the rapid development of the Internet, the explosive growth of the Internet-based technologies leads to a great improvement of cloud computing. And cloud storage technology is the pioneer of cloud computing technology. This paper proposes a system architecture of private cloud storage system. Private cloud storage system has some unique features compared to public cloud storage system. The private...
MANETs (Mobile Ad hoc Networks) are self organized networks with mobile and collaborating nodes without any pre-established infrastructure. Because of these characteristics, securing MANETs constitute a hard and challenging task. Consequently, new mechanisms may be of interest to secure such networks. To this end, we have found that trust management can be a support for MANET security. In fact, the...
Multi-chassis (MC) endpoints and link aggregation groups (LAG) are common configurations in production networks today. Security automation processes that rely on correct topological data require a machine-process able representation of corresponding network topologies. Unfortunately, MC-LAG setups can be interpreted in more than one way regarding the topological layout, which complicates the process...
Cover time measures the time (or number of steps) required for a mobile agent to visit each node in a network (graph) at least once. A short cover time is important for search or foraging applications that require mobile agents to quickly inspect or monitor nodes in a network, such as providing situational awareness or security. Speed can be achieved if details about the graph are known or if the...
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing in mobile ad hoc networks (MANETs). Most of the existing defense schemes are not effective for the internal attackers that know how the scheme works. In this paper, we propose a neighborhood connectivity based trust scheme that can detect the single and colluded attackers during route...
This paper includes security constraints in OPF calculations for combined HVAC and HVDC grids. Two formulations of the problem are considered: a preventive and a corrective formulation. The outages of lines, generators and terminal stations are included. The preventive control method assumes that no control actions are taken after a contingency happens, meaning that all actions must be performed in...
State estimation plays a critically important role in ensuring the secure and reliable operation of the power grid. However, recent works have shown that the widely used weighted least squares (WLS) estimator, which uses several system wide measurements, is vulnerable to cyber attacks wherein an adversary can alter certain measurements to corrupt the estimator's solution, but evade the estimator's...
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to...
Congestions and undesirable power flows are an increasingly common occurrence in transmission networks. One possible measure to eliminate the congestion in network would be changing the network's topology since the stated changes the impedance of the network, which results in a change of power flow. Since the change in network topology has various implications, it can also be used as a powerful tool...
Software-Defined Networking (SDN) is now envisioned for Wide Area Networks (WAN) and deployed constrained networks. Such networks require a resilient, scalable and easily extensible SDN control plane. In this paper, we propose DISCO, a DIstributed SDN COntrol plane able to cope with the distributed and heterogeneous nature of modern overlay networks and deployed networks. A DISCO controller manages...
The Optimized Link State Routing is a proactive link state routing protocol for Mobile Ad hoc Network. The Multipoint Relays nodes which are one-hop neighbors are used as a means for flooding of control and traffic messages into the network. The RFC 3626 does not consider the security issues. The secured OLSR framework consists of security module which provides the security with minimum overhead....
To date, there have been many developments in Communications Networks which have resulted in the complex structure of Internetworks. To tackle this complexity and achieve the peak performance and security in such implementations, various network management practices are introduced. The scope of this paper is to study the impact that the novel concept of Bring Your Own Technology (BYOT) will have on...
Mobile Ad Hoc Networks use anonymous routing protocols to hide node identities and routes from outside observers in order to provide anonymity protection. However, existing Anonymous Location-based Efficient Routing Protocol (ALERT) dynamically partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. ALERT...
The Optimized Link State Routing is a table-driven link state routing protocol for Mobile Ad hoc Network. It uses the Multipoint Relays as a mechanism for flooding of control and traffic messages into the network. The design of protocol by RFC does not consider the security issues. The various authentication and encryption techniques help to secure this protocol against attacks from outside intruders...
As privacy becomes an increasingly important issue on today's Internet, attacks on anonymous tools gain more attention. In this paper, we investigated countermeasures to a routing table insertion (RTI) attack on Freenet. We analyzed the key factors supporting the RTI attack, and proposed a simple randomized routing method to mitigate the RTI or similar attacks. We implemented the proposed method on...
Named Data Networking (NDN) is a clean slate Internet paradigm that embeds some security primitives in its original design, which is being considered as one of the promising candidates for next-generation Internet architecture. However, it may suffer from some emerging threats such as Interest Flooding Attacks (IFA), which means corresponding security management mechanisms need to be designed to improve...
The paper considers the main issues and recommendations for using the risk assessment techniques based on the analysis of static, dynamic and historical security information. The system of security metrics and techniques for their calculation are suggested. Proposed techniques are based on attack graphs and service dependencies. They allow evaluating security of network topologies, malefactors and...
The deployment of new security technologies in existing network topologies requires exhaustive testing before usage to avoid down time of the production systems. Nowadays, the required testing is in many cases omitted due to the complexity of creating test cases and experimental set ups. The VISA (Virtual IT Security Architectures) project [1], funded by the German Federal Ministry of Research, aims...
Security problem in MANET has been prevailing even after several researches by the various authors. Since application of security mechanism affects the system performance very much therefore there is always scope for further research in this area. Another major cause is fast technology growth in the area of MANET. Recent researches are focusing on another mechanism of security which involves trust...
In this paper, a risk-aware robotic sensor network (RSN) is proposed in the context of Critical Infrastructure Protection. Such a network will be comprised of mobile sensor nodes that perceive various aspects of their environment and topologically reconfigure in order to secure a strategic area of interest. Risk awareness is provided through the application of a recently developed Risk Management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.