The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: signal processing; cognitive radios and networks; communication systems; network protocols and performance; ad hoc sensor network; telecommunication security; and mobile computing systems and technologies.
Botnets have become one of the major tools used by attackers to perform various malicious activities on the Internet, such as launching distributed denial of service attacks, sending spam, leaking personal information, and so on. In this paper, we present BotCatch, a behavior-based botnet detection system that considers multiple coordinated group activities in the monitored network to identify bot-infected...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
The following topics are dealt with: communication network; communication service; cognitive radio; protocols; security; ad hoc network; mesh network; all optical network; cellular network; network coding; resource allocation; wireless sensor network; and network performance.
Radio frequency (RF)jamming is considered as one of the most proficient technique to launch Denial of Service (DoS) attack in wireless networks. Majority of the jamming attacks to-date largely focus on jamming efficiency by transmitting colossal volume of data to obtain better jamming effectiveness. Consequently, as more and more data is transmitted the probability of detecting the presence of a jammer...
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all...
Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge,...
Currently the most popular secure protocol is SSL (Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI (Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL protocol,...
With the mass deployment of the RFID system worldwide in recent years, the security concern of RFID system is becoming more and more important and pressing. However, one of the main standards of RFID technology, EPC Class-1 Generation-2 RFID standard has a very low security level, as analyzed in previous work such as. In this paper, we first have a brief review and fully security analysis of different...
In a crisp commitment schemes, a commitment must be opened using a unique opening key. However in such schemes, there could be many instances where the transmission medium or channel is corrupted by some kind of communication (transmission) noise. In this paper, we proposed a new scheme that enables the injection of fuzziness property to current ordinary crisp commitment scheme. In this way, the uncertainty...
Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think over it for security perspective. Sensor network works...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Key management is an important area of research in Wireless Sensor Networks (WSN), because resource constraints make security protocols difficult to be implemented. Key predistribution, which involves preloading keys in sensor nodes, has been considered as the best solution when sensor nodes are battery powered and have to work unattended. We propose a deterministic key predistribution scheme in WSN,...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
In this paper, we present a short group signature scheme for dynamic membership with controllable link ability. The controllable link ability enables an entity who possesses a special linking key to check if two signatures are from the same signer while preserving anonymity. It can be used for various anonymity-based applications that require necessarily the link ability such as vehicular adhoc network,...
Radio Frequency IDentification (RFID) is a leading ubiquitous computing technology for the future. However, the rapid deployment of low-cost RFID tags in large scale raises significant personal privacy threats. Low-cost tags are extremely resource-constrained devices. Hence it is easy to corrupt a low-cost RFID tag to obtain useful information, trace its history and discover its identity. Therefore...
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable...
Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, a new authentication mechanism for cognitive radio networks is proposed which is based on third-party Certification Authority (CA). In...
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership transfer of RFID tags is also another important requirement for some applications. Namely, the owner of an RFID tag may be required to change several times during its life-cycle. For an ownership transfer, the server of the new owner takes over tag authorization in order...
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.