The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candidate to realize lightweight and robust device authentication in Internet of Things applications. Unfortunately, it is particularly difficult to attain highly reliable responses and increase its modeling attack resistance simultaneously. This paper presents an approach to reduce the vulnerability of...
New media has increased communication between people all over the world and the Internet. Problems can be solved by centralized management of SDN controller in 5G, such as security and limited bandwidth in new media. An authentication server and a database server are connecting to the same switch. SDN controller generates a flow table routing to the authentication server, when it receives requirements...
It has obvious advantage to adopt 802.1x authentication for network access control. This paper analyzes 802.1x protocol, EAP protocol and RADIUS protocol, and constructs AAA which is based on 802.1x authentication at the end. Using software the messages of the whole authentication process have been captured. According to AAA mechanism it analyzes EAP messages and RADIUS messages detailedly. The analysis...
The modeling and analysis of security properties in large and complex networked systems is more and more demanding for the availability of computer-assisted software tools able to help designers and engineers in describing and verifying their systems in an easy way. Indeed, on the one hand these tasks are usually cumbersome and error-prone when carried out manually, while on the other hand they have...
This paper presents a concept for hierarchical distributed control of SDN networks. The proposed architecture is based on a heterogeneous control plane with a hierarchical structure that offers a general framework for building non-classical SDN deployments. This control plane organizes a group of controllers nodes, into a hierarchy, with each tier containing one or more interconnected controllers...
In this paper, we implement an Open Flow based fully functional 802.1X access network and an IP based cognitive access network which are interconnected as edge networks to our SDN core. We realize seamless mobility in the WLAN domain and mobility between WLAN and Cognitive networks for the clients with dual band support. The pre-installed flows on the backbone aggregate traffic from access networks...
Two-step authentication, which uses SMS or voice calls, is becoming more practical for user authentication or for preventing phishing attack. However, conventional methods have vulnerabilities to man-in-the-middle or social-engineering attack or cellphone theft. As a general problem, it is difficult to prevent a legitimate user's denial. Therefore, we propose a secure user authentication method that...
In order to guarantee the security of the communication between the in-vehicle IPv6 subnet and internet, a scheme is putted forward based on the address filtering in the network handoff. This scheme considers the address filtering in the network handoff, when the mobile node came into a different network, it only needs to filter its own IPv6 address without the need to re-access authentication. Tests...
In the research institutes such as universities or companies, they contract electronic journals for document retrieval and document collection. When an organization contracts electronic journals, the site license is preferred. Because of terms of a site license include location or affiliation of users, available electronic journals differ from users. On the other hand, the user and the terminal are...
Voice over Internet and more generally unified communication raised their importance in last decade as they are more and more reliable and robust. However as they gets more widely used, security issues became more noticeable and dangerous indeed. The objective is to give the reader a good overview and most relevant details about technologies used. This document provides architectures overview as well...
Re-Authentication is required after the initial authentication in IEEE 802.16e to guarantee the security of the keys. We analyze the key factors in the re-authentication under the 5 authentication modes. And aiming at the RSA + Authenticated_EAP mixed mode, the re-authentication mechanism is designed. A PAK/PMK_counter is added into the PAK and PMK buffer, which can adjust the keys' lifetime to increase...
Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.
Aiming at moving aspect of heterogeneous wireless network, The paper puts forward a heterogeneous network mobile management mechanism- Identifiers Split Memory, Substitution Transmission Scheme ISMSTS, introduces the basic theory and the protocol process of ISMSTS detailed, and makes the performance analysis and the contrast with MIPv6 protocol. ISMSTS is the mobile management scheme based on the...
In this paper, we propose a mechanism to support switching of multimedia services toward one display equipment among others connected to IP sharing device especially in home network. For this, we developed a client agent mounted on display equipment for recognizing of user's information, a switching agent mounted on IP sharing device, which is related to IPtables management in the device, and embedded...
Seamless handoff issues including authentications have become considerable interest in wireless networks, which support pervasive environment users. Usually the active scanning and preauthentication methods are adopted to solve the disruption in seamless services. In this paper, we propose a new preauthentication scheme based on the fast channel switching and the power saving mode (PSM) in public...
USB key represents one of the smallest computing platforms today. With the development of USB key chips, more and more security features will be supported by USB key. Network security middleware is a Java and HTTP-based development framework on USB key. Developers can develop and on line load network security-related programs on this framework. End users can use this USB key to establish secure network...
The proposed paper describes the ease of security while on the go, by using the PDA from any where. The system will recognize the user and then connect the user with its server to handle the security devices installed on the station. In our proposed system we have two setups, one as client (PDA) and other as server (home base).The client will gain access through a WAP with the server using username...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.