The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
This paper presents voltage security assessment with application of Phasor measurement unit (PMU) using Decision Tree (DT). An algorithm is developed by CART to identify the most sensitive buses which are most viable and hampered the security of power system. Such buses are ranked in terms of their index called joint bus ranking. PMUs are costly devices and should be placed only on such buses which...
Cloud Computing is the key technology of today's cyber world which provides online provisioning of resources on demand and pay per use basis. Malware attacks such as virus, worm and rootkits etc. are some threats to virtual machines (VMs) in cloud environment. In this paper, we present a system call analysis approach to detect malware attacks which maliciously affect the legitimate programs running...
This paper presents a software implementation for an Intrusion Detection System (IDS) and Honeypot zone based on network traffic analysis. HoneYDSPK monitors real time network traffic and blocks the potential sources of attacks by sending commands to the firewall controller. The application is based on the Cisco SDN implementation One Platform Kit. This paper comes with a new approach by allowing...
The paper proposes a distributed architecture to monitor spectrum occupancy status through the use of Software Defined Radios (SDRs). Such a monitoring process is useful in order to fulfill a geolocation database, whose consultation is a mandatory task for license-exempt devices operating under the IEEE 802.22 standard rules. Moreover, the system is thought for a dual use scenarios: it can be enforced...
In today's knowledge society data plays a central role. Large parts of an organization's critical data currently resides in databases which makes them an attractive target for cyber-attacker. The increasing digitization and interconnection of organizations combined with growing complexity of IT systems led to increased attack surface of most organizations. At the same time cyber-adversaries increased...
Data characteristics stored in the database evolve over the time. Nowadays, it is inevitable to store all states of the objects over the time. Paradigms of conventional database are based on managing actual states, which are inappropriate. Therefore, temporal approach has been developed. In this paper, we deal with our proposed temporal solution based on attribute level architecture, which can be...
The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different...
With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users'...
The Internet of Things (IoT) offers many interesting solutions to problems encountered in a range of application areas. The potentially huge number and the diversity of things that may be part of such an infrastructure can pose prominent issues for their systemic management. This paper explores such issues and proposes a management platform that partially addresses them. More specifically, our proposed...
Nowadays most of the public and commercial transportation organizations are using the vehicle tracking system to track the vehicles in real time. But, in many organizations like cab service providing companies, public vehicles and school busses do not have the security system. The purpose of this project is to provide the effective vehicle tracking, real time online monitoring, dedicated remote server...
In order to find out the network security problem of the IP Multimedia Subsystem (IMS) in Diameter protocol, first of all, this paper builds a security test model of classification entity according to different entities in IMS network. Then owing to the fact that test messages are difficult to pass the protocol specification, we present a limited distance method for generating test message based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.