The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is an important concern in Voice over IP (VoIP) applications. An approach to securing the signaling, such as the Session Initiation Protocol (SIP) and Location to Service Translation (LoST) messages, is to use Transport Layer Security (TLS). Several studies have measured the impact of using TLS on SIP. However, there have not been any tests on the impact of TLS or Internet Protocol Security...
Routing is the process of selecting path in a network along which to send network traffic. Routing is performed for many kinds of network, including the telephone network, electronic data networks, and transportation networks. it involves two basic activities: Determining best path and forwarding packets through these paths. The internet routes packet one at a time, some of these packets may be delayed...
While the majority of Internet traffic is becoming high quality multimedia, efficient and secure content sharing with intuitive usability remains an elusive goal. In this demonstration, we present Virtual Private Community (VPC) service platform running on consumer devices such as smart phones, PCs and smart TVs in a distributed manner. It enables end-user consumers to create a hierarchical and closed...
The worm is still one of the most serious threat to the Network security. The logical worm propagation model could characterize the propagation of Internet worms more exactly, and could be more helpful to carry out the worm protection, detection and suppression technology research. In the initial phase of this paper, a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was...
It is commonly recognized that the dual semantics of IP address has brought about serious scaling and security problems in today's Internet. Aiming at addressing these problems, several recent researches propose identifier-based universal network to replace the IP namespace with an identity namespace and a locator namespace. In this architecture, it successfully introduces the mapping idea to accomplish...
From time to time, global routing is affected by local misconfigurations of global impact. Incorrect routing information leaks into the global routing — IP address space becomes hijacked. As such incidents are highly problematic and may even serve as blueprints for purposeful attacks, concepts to prevent or at least automatically detect such incidents are desirable. As planned architectures to prevent...
The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are...
IP prefix hijacking is a well-known security threat that corrupts Internet routing tables and has some common characteristics such as MOAS conflicts and invalid routes in BGP messages. We propose a simple but effective IP prefix hijacking detection method which is based on reachability monitoring. Network reachability means a characteristic that a packet must reach the destination network although...
BGP prefix hijacking is one of the main threatens for the Internet. It is important to identify the impact factors for prefix hijacking. This paper studies the problem from the view of AS logical topology by analysis of the data from the snapshots of CAIDA. We propose a hierarchical model based on AS relationship to classify the AS nodes into different level and define core size of each node to prioritize...
In order to make up for deficiencies in the current mine-security monitoring system, the paper proposes a mine-security real-time monitoring system based on 6LoWPAN. In the system, WSN achieves the direct access to the internet and does not need a specific gateway to fulfil the protocol conversion or the protocol bearing, and in the meanwhile WSN achieves the end-to-end communication with the Internet...
In order to study the relationship between the diversity of BGP prefix hijacking impact and the topology of participants, we apply a data mining method. We get instances from numerous prefix hijacking simulations on the authentic Internet topology, and evaluate the importance of topology attributes using information gain-based attribute selection. Then we estimate the precision of classification by...
This paper presents an extension of BGP4 based on trust model. Specifically, we first establish a trust model appropriate to evaluate ASes' trust degree toward its neighbors in two ways, direct observations and recommendations; Secondly, the trustworthiness of every AS path advertised is estimated iteratively by utilizing the trust degree of ASes; Finally, the current BGP4 is extended by adding a...
Unattended Wireless Sensor Networks (UWSNs) are networks that operate without on-line data collection entities (Sink Collectors). This configuration enriches their flexibility but, at the same time, introduces new security issues. A challenging issue is data survival: in absence of the sink, in fact, data sensed by network sensors cannot be kept clear from the adversary. Cryptographic schemes, moreover,...
In this article, I develop two major propositions. First, the future Internet should be polymorphic, and it should conciliate different architectural networking paradigms. The second proposition is that the future Internet should necessarily build on a strong theoretical basis from a networking science that is in the course of development. Particularly, I describe how virtualization makes possible...
In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space. However, a clever worm can develop a more intelligent scanning strategy to find target hosts. This paper presents a worm which uses the p2p-based...
Energy costs for data centers are a significant part of the overall expenses for their operation. With a reduction of these and associated costs, huge savings can be achieved. This paper describes a way to reduce the energy costs for data centers. The general idea behind our solution is very simple. Instead of routing the information required for any service interaction to and from the data center...
We present a new Internet architecture based on de-conflated identities (ADI) that explicitly establishes the separation of ownership of hosts from the underlying infrastructure connectivity. A direct impact of this de-conflated Internet architecture is the ability to express organizational policies separately and thus more naturally, from the underlying infrastructure routing policies. Host or organizational...
The Internet of Things is rapidly diffusing, though severe modifications are needed to the current Internet architecture to cope with its new requirements. A major step forward is decoupling the name of an object (identifier) from its physical location (locator), which are both expressed by the IP address currently. We argue that additional advantages can be brought if context metadata are provided...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP...
Cloud computing is the next generation of networking computing, since it can deliver both software and hardware as on-demand resources and services over the Internet. Undoubtedly, one of the significant concerns in cloud computing is security. Virtualization is a key feature of cloud computing. In this paper, we focus on the security of virtual network in virtualized environment. First, we outline...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.