The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
In this paper, we introduced a novel authentication scheme for peer-aware communication (PAC) networks. PAC devices (PDs) can communicate without infrastructure, because PDs are able to communicate in an ad hoc manner. Due to the absence of infrastructure, there are no certification authorities (CAs) or trusted third parties. Therefore, PDs have to have the ability to authenticate each other even...
Operating system level virtualization containers are commonly used to deploy virtual network functions (VNFs) which access the centralized network controller in software-defined networking (SDN) infrastructure. While this allows flexible network configuration, it also increases the attack surface, as sensitive information is transmitted between the controller and the virtual network functions. In...
Recently, several protocols have been proposed to accomplish user authenticity with proper session key establishment in Global Mobility Network. Unfortunately, some of them still suffer from various security threats and high computational complexity. This article demonstrates a new enhanced two-factor authentication scheme for secure anonymous communication to mutually authenticate the communicating...
Many-core architectures are similar to a computer network, where it is necessary to ensure the security during the execution of sensitive applications. This article discusses two security-related issues: the secure admission of applications and the prevention of resource sharing during their execution. The safe application admission is an open research subject for many-core systems. Although several...
Most companies currently carry out security countermeasures against maximum-security risks based on countermeasure cost. However, maximum security is costly and low availability. If we can evaluate and recognize risk dynamically, we can change the security level according to that risk. Therefore, it is possible to lower the security level than maximum security. As a result, availability increases...
In this paper, a user-authentication scheme that is designed to ensure privacy and security of health-information exchange in cloud computing is proposed. The proposed system will allow health care centers and doctors to securely and efficiently monitor patients' health at their homes using secure integration of medical devices and healthcare systems such as: body sensor networks, wearable devices,...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data...
Dynamic spectrum access (DSA) has been envisioned to become the key to solving worldwide spectrum shortage. However, the open nature of wireless medium brings severe threats to the DSA system resulting from unauthorized access. Specifically, unauthorized secondary user (SU) utilizes the licensed spectrum by faking/replaying the spectrum permit, which will not only introduce severe interference to...
In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks;...
In all the security issues in wireless sensor networks (WSNs), session key exchange is fundamental one with a great challenge. Owning to the semi-group property and one-way trapped characteristic of Chebyshev polynomials, an enhanced key exchange scheme based on Chebyshev chaotic map for WSNs was proposed in this paper. Our scheme aims at increasing the security of the session key between nodes. According...
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
Nowadays, touchscreen mobile devices make up a larger share in the market. Users often use these devices to store personal and sensitive data. This necessitate to find more effective and robust methods to continuously authenticate touch-based mobile device users. In this paper, we propose two levels of behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different...
Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the...
In this paper, we propose a novel secure and privacy-preserving scheme for enhancing security in vehicular cloud based tasks announcement. The proposed scheme uses an efficient multiple receiver signcryption technique with proxy re-encryption in order to prevent the private information of the vehicles from being disclosed during task announcement. By integrating the proxy re-encryption algorithm with...
Cloud computing is rather new, and there're, of course, concerns like data-protection. This technology is developing as a standard for data-sharing on remote storages. Cloud has been able to convince users and companies' owners to transfer their data to Cloud so they can use Cloud resources and reduce their costs. Due to importance of data for its owners, there's always concern about security. When...
The digitalization of modern television broadcasts makes it possible to provide interactive content to consumers over the air. But the hitherto unsecured nature of such broadcasts combined with the ever-increasing complexity of Smart TV software have created an opportunity for attackers to strike at consumers. DVB has updated the relevant standard to allow broadcasters to secure their services against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.