The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Focusing on the issues of security and energy efficiency, we present an energy-efficient secure routing protocol for wireless sensor networks (WSNs). With the location and energy-aware characteristics for routing, our protocol gives a better delivery rate, energy balancing, and routing efficiency. In addition, the proposed security mechanism ensures the data authenticity and confidentiality in the...
How to apply timely and effective defense strategies against attackers while maximizing system survivability is a critical issue for a defender. This paper mathematically models attack and defense scenarios, using various defensive mechanisms during both the planning and defending stages and under quality of service constraints. This model incorporates high degrees of randomness, as attackers are...
Distributed network of sensors form a deployable key to information with self organizing capabilities from smart environments (building, home, utilities, industrial, transportation etc). In this paper we present the vision of wireless sensor network (WSN) which enables the interconnectivity that extends the reach of cyberspace out into the physical world with the low cost, high sensing fidelity, flexibility,...
Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introduced the Vulnerability analysis methods for communication network, command & control network, mobile ad hoc network and satellite network. At...
Organizations shifting to a public cloud infrastructure face potential hurdles regarding control and security, and must acquire a new set of best practices regarding developing and deploying to a cloud infrastructure. We propose a reference architecture for a virtual private cloud built on cross-provider ondemand compute instances, with a set of components, services, and algorithms to produce a managed...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat — the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack and local repair attack. We also propose an...
Vehicular networks will enable vehicles on the road to utilize wireless communication to exchange safety information; enhancing traffic flow and minimizing accidents. With vehicle positions being the most frequently exchanged information in vehicular networks; it becomes imperative to establish a strong level of trust in the announced positions before a vehicle may take action in response. This paper...
The decentralized distributed system characteristics of ad hoc networks bring up some security problems. To ensure the safe, efficient and flexible data transmission in ad hoc networks, this paper presents a trust routing framework based on topology control theory. This framework establishes a trust topology layer independent of routing layer, and the routing procedure executes over the trust topology...
BGP prefix hijacking is one of the main threatens for the Internet. It is important to identify the impact factors for prefix hijacking. This paper studies the problem from the view of AS logical topology by analysis of the data from the snapshots of CAIDA. We propose a hierarchical model based on AS relationship to classify the AS nodes into different level and define core size of each node to prioritize...
Email is one of the most convenient and indispensable communication mediums in our life. However, virus and email worms quickly evolved the ability to spread through the Internet by various means such as email, and exploiting vulnerabilities, etc. This paper presents a novel email worm propagation simulation algorithm based on the user's behavior and the network topology. With Enron Email Dataset,...
Electricity markets are operated upon reliable power system operation, where physical resources and financial transactions are committed based on variable market and system inputs. System operators need to ensure transmission reliability at all times. Transmission outages occur daily to allow reliability maintenance and integration of network upgrades. Outage windows vary with the complexity of work...
Due to the importance of topology discovery for many tasks of sensor networks, in this paper, we discuss the basic approaches for network topology discovery, point out the security issues of the network topology discovery and propose possible countermeasures.
Intrusion detection and prevention systems (IDPSs) are widely used to secure computer networks. They monitor network traffic by searching for unusual combinations in protocol headers and for malicious patterns in the packet payloads. In this paper we present “Matryoshka”, a vulnerability that allows tunneled malicious packets to bypass the signature mapping procedures implemented in many industrial...
Identifying the source address of an IP packet is difficult with the IP protocol. Consequently it has been difficult to resolve distributed denial of service (DDoS) attacks on the Internet. This paper presents an autonomous system (AS) methodology for IP trace back based on the probabilistic packet marking (PPM) scheme. Although many PPM mechanisms have been proposed, almost all assume that all routers...
In order to study the relationship between the diversity of BGP prefix hijacking impact and the topology of participants, we apply a data mining method. We get instances from numerous prefix hijacking simulations on the authentic Internet topology, and evaluate the importance of topology attributes using information gain-based attribute selection. Then we estimate the precision of classification by...
Middle Boxes serve for the security in Data Center Networks (DCNs). Together with the growth of the services and applications in DCNs, flexible and scalable middle box deployment is highly required. The current middle box deployment methods are error prone. In this paper we propose Policy Aware Data center network (PAD), a flexible and scalable middle box provisioning architecture. PAD supports traditional...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
We analysis the Taiwan¡¦s electric environment and theTaiwan¡¦s AMI architecture. The AMI system for high-voltage users has stared trial run. However, that for low-voltage users has begun to design. Here, we first design an available protocol architectures to support the AMI system for low voltage users. Then, a hierarchical two-layer security scheme base on our proposed protocol architectures is...
A competitive coevolutionary particle swarm optimization approach is proposed in this paper to train neural networks from zero knowledge to act as security trading agents. The coevolved neural networks are used for timing buying and short selling securities to maximize net profit and minimize risk over time. The proposed model attempts to identify security trend reversals using technical market indicators...
In this paper, we study the optimal design of linear network coding (LNC) for secure unicast against passive attacks, under the requirement of information theoretical security (ITS). The objectives of our optimal LNC design include (1) satisfying the ITS requirement, (2) maximizing the transmission rate of a unicast stream, and (3) minimizing the number of additional random symbols. We first formulate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.