The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work targets to the technologies of the Internet of Things (IoT), regarding to security and trusted devices. It provides to the readers a comprehensive understanding of both security and privacy aspects. Modern systems and networks are quoted, in order to cover any questions arising from the theoretical approach. Hardware integration devices are also presented, for flexible implementations for...
In our country, type and quantity of network attacks have continued to grow, China's network infrastructure and the important information system is also facing serious security challenges. A variety of network attacks and other network security incidents have become the bottleneck in the development of our national economy, and even endanger the social stability and national security of the important...
Being widely adopted by worldwide service providers, the MPLS technology to connect geographically separated customer sites becomes important in reliability. It is used to implement VPNs to connect the customer networks i.e., Inter-provider VPN network. In this project we first briefly describe VPNs which are behind the scope of secure private MPLS connections such as several VPN deployments emerged...
DNSSEC Look-aside Validation (DLV) is examined, highlighting its lax specifications and privacy implications. By performing extensive experiments over datasets of domain names under comprehensive experimental settings, our findings firmly confirm the privacy leakages caused by DLV. We discover that a large number of domains that should not be sent to DLV servers are being leaked. We explore the root...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
Internet Finance promote the innovation and development of financial field, at the same time, it also has its own risks, such as system security risk, capital security risk, higher liquidity risk, market selection risk, monetary policy risk. So the internet financial supervision is very necessary, regulators should pay attention to the risk characteristics of the Internet financial regulation, establish...
Internet of ETC is a problem that current technology development and users needs to be solved urgently. Furthermore, the risk of Internet access to traditional industry is the main direction currently being explored and studied across all trades. This paper will propose a set of Internet service security system.
With the rapid development of mobile Internet, android system becomes the absolute overlord of the operating system, which has an unparalleled influence to the smart phone industry, but also closely related with people's lives. However, the feature of open source and lacking of regulatory of Android system led to a lot of security risks. Because of the widespread use of Android Intent Mechanism, the...
Location-aware privacy protection is a key issue in mobile applications. And the issue is more concerned in Internet of Vehicles (IoV) because of the needs for more accurate location information. Conventional location hiding methods are not suitable to be used in IoV scenario, since they blur the location information fuzzily. In this paper, the dynamic pseudonym method is used to break the link between...
In World Wide Web (www) software engineering is playing an inevitable role. Implementation of regular software engineering models seems a little redundant on any Web Based Applications. The objective of the research is to implement component based software development for Web Based Applications to perform different services. Therefore, the theme of the research work would be on component selection...
In the article describes the main perspective directions of development of Worldwide network the Internet reveal: Internet of things, Industrial Internet of things, tactile Internet of things. These directions it is planned to unite in the general concept of Internet of with the basic principle “Always in touch”. Potentially it means increase number of connections to the Internet to 70 trillion by...
This paper presents an analysis of the relationships between individuals' traits and cohesion in the virtual community environment. Individual traits relate to personal qualities of members of the community where this paper attempts to present their influence over community cohesion. Four research variables were identified to represent the traits of the virtual community members. Experience relates...
In many Internet of ing (IoT) application domains security is a critical requirement, because malicious parties can undermine the eectiveness of IoT-based systems by compromising single components and/or communication channels. us, a security infrastructure is needed to ensure the proper functioning of such systems even under aack. However, it is also critical that security be at a reasonable resource...
Autonomous vehicles must communicate with each other effectively and securely to make robust decisions. However, today's Internet falls short in supporting efficient data delivery and strong data security, especially in a mobile ad-hoc environment. Named Data Networking (NDN), a new data-centric Internet architecture, provides a better foundation for secure data sharing among autonomous vehicles....
Existing access control strategies for Internet of Things cannot provide good flexibility, robustness or quick response. We propose an access control approach of finer granularity and techniques supporting bulk operation to make interaction in IoT more flexible. Also, a decentralized strategy and data centric network techniques are used to enhance the system robustness and swiftness. We implement...
The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic,...
The rapid spread of the Internet in China is also changing people's consumption habits and lifestyle, small to food and entertainment, large to the defense industry, the Internet has been integrated into every corner of China's economic industry. With the Internet consumption of consumer spending and the promotion of consumer ideas, China's Internet consumer financial market came into being and achieved...
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
At present, internet and social networks are most used by teenagers. New on-line conduct and preferences have been generated by positive and negative content and easily accessed in the web without any parenting control. The purpose of this paper is to recall most common risks for teenagers like inappropriate content, pornography, websites with malicious software, contact avoidance with unknown people...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.