The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
in this work, SDN has been utilized to alleviate and eliminate the problem of ARP poisoning attack. This attack is the underlying infrastructure for many other network attacks, such as, man in the middle, denial of service and session hijacking. In this paper we propose a new algorithm to resolve the problem of ARP spoofing. The algorithm can be applied in two different scenarios. The two scenarios...
We explore a novel model of computation based on nodes that have no public addresses (ids). We define nodes as concurrent, message-passing computational entities in an abstract communication medium, similar to the Actor model, but with all public node ids elided. Instead, drawing inspiration from biological systems, we postulate a send-to-behavior language construct to enable anonymous one-way communication...
This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks, unsolicited message attack and data set injection. The experiments were run on a computer virtual environment and then simulated in DETER testbed...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
This paper presents new aspects of using biometric features and patterns for creation of new cryptographic protocols. These protocols are dedicated for secure information sharing and distribution processes. Such algorithms allow protecting confidential data sets, and performing secure operation for different kinds of information. Bio-inspired techniques for securing information will be presented on...
Advanced and abstract concepts of engineering and sciences are difficult to teach using traditional media such as whiteboards and still slides. In the computer networking classroom, teachers have the challenging task of communicating abstract ideas and concepts such as the Open Systems Interconnect Model (OSI Model), Message Encapsulation, Protocol Stacks and many others. Modern teaching methods such...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
The main goal of this paper is to present a simple and inexpensive software solution for remote management of PTZ camera systems EVI-D70CP. Performed analysis demonstrates the technological solution for control of multiple cameras within lecture room or laboratory. Paper deals with the differences in the various serial communication methods, various functionalities of camera systems, followed by a...
In this paper authors present a new method to organize hardware search in the tables of rules in the software defined network (SDN) switch. This paper describes the design features of modern SDNs based on open standard OpenFlow, main problems of modern OpenFlow switches, and proposes a new approach for building hardware search based on field-programmable gate arrays (FPGAs). The proposed method allows...
Network security is one of the biggest concerns of any organisation irrespective of their size and nature of a business. Intrusion detection system (IDS) is considered as one of the most popular and effective security tools for generating alerts to the systems or network administrators to inform possible or existing threats. A standard IDS may not be very effective or even unsuitable for an organisational...
One problem that arises with remote attestation is that while the second remote party gets an attestation of measurements taken for the first party, the measurements do not indicate when they were taken. Existing attestation protocols include a nonce to prove that the quoting of the measurements is fresh; however, this alone does not provide an indication of when those measurements were actually taken...
Customized applications for mobile network enhanced logic (CAMEL) application part (CAP) is a protocol used in 3G networks in order to communicate between the different components in the network. Where as in 4G networks DIAMETER protocol is used which provides higher data rates and increased throughput in the network, when compared to the CAMEL protocol. This paper describes the conversion of CAMEL...
In recent years, with increasing use of internet the computer systems are facing many number of security issues. Intrusion detection system (IDS) is one of the principal components of any information security system. Identification of anomalous activity in computer network is first step in identifying the threat to information system. Our focus is mainly on Genetic algorithm (GA) based anomaly detection...
In this paper extension to LEACH protocol i.e. Modified LEACH protocol has been analytically and critically analyzed. It has been shown that the hard threshold value in Modified LEACH protocol has a direct impact on the network lifespan of a wireless sensor network. More the initial energy more will be the net lifetime of the network, as the number of alive nodes will be more. Simulation and analytical...
Previous research [2] have developed an aspect orientation agent framework based on Aglets. Aglets [1] is an object orientation agent framework. Aglet have transformed from object orientation (OO) to aspect orientation (AO) approach. The transformation process is called refactoring. Crosscutting concerns (CCC) [3] is problems behind of refactoring process. This study is a step to prove the AO Aglets...
In this paper, an early flood warning system has been studied and developed. The system consists of an early flood warning station powered by solar energy, a monitoring center, and a notification system. The flood warning station is equipped with the water level sensor and the precipitation sensor. The data, which is received from sensors, will be stored in memory card and transmitted to monitoring...
It is difficult to combine different outdoor lighting systems to work together without international protocol. TALQ protocol is a newest important international protocol on outdoor lighting control. Most important famous companies are TALQ consortium members including Philiph, GE lighting, Osram etc in the world. The TALQ new technologies apparently become important in outdoor lighting control systems...
Quantum Key Agreement (QKA) signifies that two or more participants together generate a key and QKA has to satisfy the following conditions: (1) Every participant can change the key and the key is not decided by any participant individually. (2) Only participants can know the key, nonparticipants cannot get the key through illegal means. Because of the conditions of participating together, it makes...
With the development of Internet, the streaming media video content is increasingly rich. At present, Adobe's Secure Real-Time Media Flow Protocol (RTMFP) is widely used in video transmission. In order to improve the video transmission speed, RTMFP adopts P2P technology. P2P technology brings a new question about traffic locality. This paper is verified that the cross-domain traffic is more than the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.