The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To solve the key management related problems encountered in symmetric as well as asymmetric key based schemes, recently a public key based scheme known as Certificateless Effective Key Management protocol (CL-EKM) has been proposed for dynamic Wireless Sensor Networks (WSNs). In spite of showing numerous advantages over the previously proposed schemes, this protocol shows some critical limitations...
Nowadays, with the rapid increase of WLAN-enabled mobile devices and the more widespread use of WLAN, it is increasingly important to have a more efficient initial link setup mechanism, and there is a demand for a faster access authentication method faster than the current IEEE 802.11i. In this paper, through experiments we observe that the authentication delay of 802.11i is intolerable under some...
The evolution of wireless networks involves the development of several standards, considering different radio access technologies. In a scenario of integration of heterogeneous access technologies, the optimization of vertical handover involves the need of reduction of authentication delays. In this paper, the authentication latency is evaluated by the utilization of an analytical model, considering...
In wireless sensor networks(WSNs) code dissemination is an important technology to remotely add new functionality or fix bugs after the sensors are deployed. As WSNs is usually in hostile environments, secure code dissemination has been a major concern. Most code dissemination protocols are Deluge-based which have to take much energy and memory to deal with the problem caused by out-of-order-delivery...
This contribution focuses on securing end-to-end unicast communications in heterogeneous wireless sensor networks comprising satellite links, while maintaining effective network performance. The proposed protocol extends the LOCKSAT key management procedure, and is able to guarantee a frequent key renewal while overcoming limitations of each subnetwork (e.g., sensor and satellite). The effectiveness...
Increasing demand for ubiquitous high speed data access has resulted in widespread deployment of heterogeneous wireless networking domains. Integration of heterogeneous networks presents some considerable challenges which include the demand for seamless handoff, continuity of data traffic & multimedia sessions and central authentication system, billing & security. In this paper the...
3GPP-LTE networks use the EAP-AKA protocol to authenticate and negotiate session keys with mobile users. However, with the popular trend of single user owning multiple devices and subscribing to multiple services, the EAP-AKA protocol appears inefficient because its authentication is device-oriented. In this paper, we propose a secure and efficient multi-device and multi-service authentication protocol,...
With the media-independent pre-authentication (MPA), a mobile node (MN) performs the pre-authentication and pre-configuration to get the new care-of-address (nCoA) as the layer 3 handover before the layer 2 handover, in order to lessen handover delay. However, in reality, the MN may perform the layer 2 handover due to the link going down before completing the layer 3 handover. It will cause the packet...
We introduce Slender PUF protocol, an efficient and secure method to authenticate the responses generated from a Strong Physical Unclonable Function (PUF). The new method is lightweight, and suitable for energy constrained platforms such as ultra-low power embedded systems for use in identification and authentication applications. The proposed protocol does not follow the classic paradigm of exposing...
With the proliferation of multiple wireless technologies and smartphones with enhanced radio capabilities, it has become imperative to deliver services that can work seamlessly across heterogeneous networks. As smartphones advance in their capabilities, there is an increasing adoption of services with realtime delivery constraints (e.g. video telephony, streaming). In a heterogeneous network environment,...
Message freshness and time synchronization are nowadays essential services in secure communication. Many network protocols can work correctly only when freshness of messages sent between participants is assured and when internal clocks protocol's parties are adjusted. In this paper we present a novel, secure and fast procedure which can be used to ensure data freshness and clock synchronization between...
Many efforts of the network research community focus on the introduction of a new identifier to relieve the IP address from its dual role of end-host identifier and routable locator. This identifier-locator split introduces a new identifier between human readable domain names and routable IP addresses. Mapping between identifiers and locators requires additional name mapping mechanisms because their...
The handover performance is critical to support multimedia services in the wireless networks. The algorithm should allow fast selection of the most suitable Access Point. However, in most solutions the handover is reactive and causes Mobile Station to reassociate with the Access Point that offers the strongest received strength signal at a time. The station may miss the chance to handover to the Access...
SNMPv2 is the most popular Network Management Protocol for its simplicity, wide support in most of the Operating Systems and network devices. The weakness in SNMPv2 was lack of proper security mechanism which led to the improved version SNMPv3 in 1999 [1]. It required separate PKI infrastructure and lacked support in older network devices so it could not get wide popularity and adaptation. Therefore...
The heterogeneous networks are expected to become a main focus in the development toward the Next Generation Cellular Network (NGCN). The heterogeneous networks will allow users to move freely across different networks. However, the determination of the handoff initiation time is difficult in heterogeneous networks since many factors should be considered in the decision algorithm. Therefore, in this...
In the recent years, with the gradually deep researches of the Internet of Things (IOT), the DNS based on identity and IP (IIEDNS) also attracts people's attention. The major task of this paper is to solve the problems of security-authentication. Since the traditional identity-authentication technologies couldn't satisfy the needs to the identity and IP authentication of the IIEDNS, we propose an...
This paper proposes a new Internet architecture based on splitting Mechanism. It separates the Internet access networks from the core network, and makes the IPv6 routing both in access networks and the core network more scalable. Furthermore, this paper gives the mobility management protocol of the proposed Internet architecture which supports the host based and the network based mobility management...
Vehicular Ad Hoc Network (VANET) has evolved to complement Intelligent Transportation System (ITS) for communicating safety messages while driving on the road and it faces challenges such as certificate management and privacy preservation. In this paper, a distributed authentication scheme called as Group Authentication Protocol (GAP) is proposed to resolve the most conflicting security requirements...
The emerging vehicular communications will enable a variety of applications for safety, traffic efficiency, driver assistance and infotainment. Due to high vehicular speed, sporadic connection, limited communication range, and large volume of data that need to be transmitted, vehicular communications have the crucial requirements of fast authentication and encryption/decryption. This paper addresses...
Foundational to the development of distributed control systems is the need to understand the constraints imposed by all facets of communication infrastructure. This paper concerns implementation of advanced supervisory data acquisition and control in the emerging U.S. electricity Smart Grid, which is expected to perform new kinds of control tasks on a regional basis within a small number of 60Hz power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.