The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past decade, fast technological and industrial advances have been happening in the area of autonomous Systems of Systems (SoS). A SoS is built upon integration of several systems, where the complexity of such a structure is exponentially higher which brings challenges to its analysis. However, it also has provided a large set of new opportunities in domains such as air traffic control, defense,...
Chaotic modulation is a strong method of improving communication security. Analog and discrete chaotic systems are presented in actual literature. Due to the expanse of digital communication, discrete-time systems become more efficient and closer to actual technology. The present contribution presents a reliable design method for a discrete-time nonlinear emitter, based on an analogue prototype. The...
With SDN increasingly becoming an enabling technology for NFV in the cloud, many virtualized network functions need to monitor the network state in order to function properly. An outdated network view at the controllers can impact the performance of those virtualized network functions. In earlier work, we identified two main factors contributing to an outdated network view in the case of a load-balancer:...
The problem of secure communication with the multi-antenna transmission in fading channel is an essential task. The fading channel is one of media for the eavesdropper to intercept when transmitting data. We investigate method for security in wireless communication. In particular, we focus on confidential transmission of pseudo-random location of subcarrier to increase security. This security method...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize...
Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning...
The utilization of time-synchronized operations (TSO) is gaining interest in the research community on Software-Defined Networking (SDN). This paper discusses TSO applicability in electronic packet and optical networks. In electronic packet networks, the TSO approach has been shown to improve network performance, thanks to timed network updates. In optical networks, this approach enables novel security...
In cloud environment, client user credential protection is a critical security capability that is target of adversarial attacks, especially, in cloud file synchronization applications. Among the various adversarial attacks, MITC (Man in the Cloud) attack on commercial cloud storage applications has emerged as a critical threat because it is easy to launch and hard to detect. In this paper, we propose...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
We consider a line current differential protection (LCDP) system, where the protective relays communicate via Ethernet-based networks. In correct function, LCDP devices switch off the protected power line in case of a fault. Since such a switching may immensely effect the entire power grid, the communication line between the protective relays is an attractive target to attack power grids. For LCDP...
The synchronization of stock price in recent years is the hot topic of corporate finance. In this paper, we use the data of A share listed companies in China in 2010–2015 to study the barrier of separation of two rights (control right and cash flow right) to market information transmission characterized by stock price synchronization. The results show that: firstly, the separation of the two powers...
This paper is presenting how teleprotection applications via packet switched wide area networks can be implemented guaranteeing required application specific performance parameters. The following different approaches are analyzed for differential protection: a. ITU-T compliant standard circuit emulation (CE) using SAToP/ CESoPSN. b. A novel approach of CE technology, using explicit clocks, developed...
In this paper, offered a new method of synchronization of the transmitting/receiving and coding stations of autocompensation two-pass quantum key distribution system with phase coding states of photons. This method is based on the use of photonic pulses, which can improve the security level of a synchronization process of quantum key distribution systems. This sync method does not include the division...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching...
A major issue of present age system on chip (SoC) designing is meeting of stringent time to market deadlines along with the reduction of various challenges faced during design. A significant strategy adopted in tackling such a problem is to procure different components or IPs (intellectual properties) of the SoC from different third party IP vendors (3PIPs). Such a technique targets independent working...
Security and real-time communication becomes more and more important for the widely application of industrial wireless technology in industrial system. However, it is difficult to guarantee both security and the real-time performance at same time in deterministic industrial wireless networks. Through the analysis of industrial wireless network requirements, a novel security mechanism in chip is proposed...
Attractors over OFDM is an emerging research concept which has immense potential for secured communication. The dynamic behavior of Rucklidge system leads to various strange attractors according to varying initial conditions and parameters. In our work one such new strange attractor has been developed and transmitted through OFDM and its behavior has been studied using MATLAB simulation. The performance...
The Controller Area Network (CAN) is the most popular protocol for electronic control units (ECUs) in vehicles which require high security. Recent usages of CAN have raised security issues because of wireless connection demanded by users. This paper presents a hardware-based scheme for increasing security in CAN. The proposed scheme is based on a previous scheme that applied the Advanced Encryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.