The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides...
Event source anonymity is potentially an important aspect of secure wireless sensor networks (WSN). The existing schemes developed for wired networks do not work in WSNs due to the characteristics of radio transmission and limited resources. A recent article proposed several solutions for the strong global adversary model. The protocols depend on dummy messages and special proxy nodes that filter...
Along with recent Internet security threats, different security measures have emerged. Whilst these security schemes ensure a level of protection against such threats, they sometimes have significant impact on perceived Quality of Service (QoS). There is thus need to retrieve ways for an efficient integration of security requirements with their QoS counterparts. In this paper, we devise a Quality...
We address the problem of efficiently revoking certificates of malicious and compromised nodes in vehicular networks. As in previous work, our focus is making sure that vehicles receive the new list of revoked certificates (CRL) before they can be compromised. Unlike previous solutions, our work revolves around the idea of making use of existing capabilities offered by mobile network operators to...
The problem of detecting packet flows between two nodes in a wireless network is considered. Especially, the transmission timings of two nodes are recorded, and their transmission rates can be time-varying (piecewise constant). Based on the timing measurements, our objective is to detect the presence of packet flows between them. Two different scenarios are considered; the first is that a flow may...
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion detection method for wireless sensor networks (WSNs), containing a large number of nodes which transmit data periodically. Intrusion detection method is based on analysis of neighbor's behavior and thresholding technique, applied to selected parameters: the number of received packets in a time window of a given...
We present a statistical probing-approach to distributed fault-detection in networked systems, based on autonomous configuration of algorithm parameters. Statistical modelling is used for detection and localisation of network faults. A detected fault is isolated to a node or link by collaborative fault-localisation. From local measurements obtained through probing between nodes, probe response delay...
In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are owned by another AS, and ends up hijacking traffic that is intended to the owner. While misconfigurations and/or misunderstandings of policies are the likely reasons behind the majority of those incidents, malicious incidents have also been reported. Recent works have focused on malicious scenarios that aim to maximize...
This paper preliminarily examines the applicability of Internet protocol (IP)-related communication technologies such as IP and MPLS (multi-protocol label switching) routers and L2 (layer-two or Ethernet) switches to existing teleprotection systems. The teleprotection systems concerned include microprocessor-based current differential teleprotection with data communications of instantaneous current...
With the rapid development of wireless communication, it is an inevitable trend that WLAN as a wireless access mode will integrate with 3GPP system and form the interworking network. How to realize the fast and authentic handover scheme of WLAN-3GPP interworking network becomes one of the focus issues in this field. In view of the weaknesses of existing handover schemes, this paper proposes an improved...
The adoption of wireless mesh networks as a solution for access networks in indoor and outdoor environments is considered by the academic community and industry as a good alternative for Internet access due to their economic and technical feasibility. However, the existence of proprietary and open-source solutions that are not interoperable and the delay in the standardization makes the deployment...
Several studies have considered control theory tools for traffic control in communication networks, as for example the congestion control issue in IP (Internet protocol) routers. In this paper, we propose to design a linear observer for time-delay systems to address the traffic monitoring issue in TCP/AQM (transmission control protocol/active queue management) networks. Due to several propagation...
The Internet based telephony services (IPTel) are mainly exposed to set of vulnerabilities that inherited from the employed protocols such as TCP/IP and proprietary VoIP protocols. One of the most critical threats in this sensitive environments is considered the denial of service (DoS) attacks. The main concern of a mechanism that focuses on detecting such attacks is the potential end-to-end delay...
Network monitor system generally adopts packets interception, protocol analysis, address filter, and address cheat etc. to achieve its functions. These methods need extra time in the process of normal data transmission, which could affect the network performance especially under the condition of busy network and the low performance of the monitor server. The users will not accept the drawback that...
This paper compares the performance of parametric and non-parametric sequential change detection algorithms for detecting in-band wormholes in wireless ad hoc networks. The algorithms considered are the non-parametric cumulative sum (NP-CUSUM) and the repeated sequential probability ratio test (R-SPRT). Theoretical performance of the two is compared using metrics that take into account the algorithms'...
IP-spoofed DDoS attack is a serious security problem in Internet. Thus, an IP traceback approach is essential. In this paper, a fast IP traceback approach (FTA) based on network statistic analysis is proposed. By maintaining the branch label table (BLT) which contains some network statistics in edge routers, the time of IP traceback procedure is efficiently reduced. In addition, an adaptive packet...
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. Although symmetric-key-based solutions such as muTESLA and multilevel muTESLA have been proposed, they all suffer from severe energy-depletion attacks resulting from the nature of delayed message authentication...
A major concern for network intrusion detection systems is the ability of an intruder to evade the detection by routing through a chain of the intermediate hosts to attack a target machine and maintain the anonymity. Such an intermediate host is called a stepping-stone. The intruders have developed some evasion techniques such as injecting chaff packets. A number of algorithms have been proposed to...
The active beacon based network monitoring tries to estimate the transfer delay of a link e by the difference of round-trip times from a beacon host to the two endpoints of e. For efficiency, we consider the problem of placing a minimum set of beacons to monitor all links of a given TCP/IP network e.g., the Internet. We propose an idea called L-beacon, i.e., a beacon can monitor only links within...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to an attack called misroutingattack. Packet misrouting disrupts the packet from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.