The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless mesh networks (WMNs) can be sequenced by itself and adapt themselves to the nodes in the network in order to maintain the default mesh connectivity. WMN compromises of mesh router which is the backbone of the mesh network and mesh client gives access for both mesh and conventional networks. Transaction of data between wireless mesh node results in privacy transgresses. We propose privacy...
Mobile Ad Hoc Networks are those which could be rapidly deployed anywhere without any infrastructural facilities. The topology will be very much dynamic and the entry and exit of nodes will be unpredictable. This makes the MANET more vulnerable to attacks. Security becomes more threatening due to the insecure admission of the nodes to the network. Variety of security protocols which successfully provide...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
In order to solve the problem of the lack of fairness and poor security in online games, this paper presents a multi-granularity reputation management model for P2P MMOG. In order to accurately evaluate the reputation of the different roles of the games players, the model assesses the reputation of different roles taken by players respectively and calculates the player's reputation by fuzzy theory...
Data-centric network plays an important part in the next generation network architecture. And name system is one of basic elements in data-centric network. This paper describes an approach which achieves the name system design criterion. In naming, a combination of three entities is used to achieve security, scalability, and flexibility. In name resolution, a three-layer structure is proposed to achieve...
Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future...
We propose a different approach to determining network availability of mobile nodes which leverages on the fact that nodes on the move will meet other nodes who will be able to share conditions of networks they have recently encountered. In our previous works, we present MOBIX, a system where nodes exchange information about network conditions using short-range communication such as Bluetooth. In...
Reputation aggregation methods are used in unstructured peer-to-peer (P2P) networks to evaluate the trustworthiness of participating peers and to combat malicious peer's behaviors. In reputation aggregation methods, each peer collects local scores by each transaction and calculates global scores by aggregating local scores. Using the global scores, individual peer can interact with reliable peers...
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and...
Trust is a concept taken from social sciences and is considered as a soft security approach that is effective in reducing risk. In this paper, for estimating the trust between unknown nodes, a group-based trust propagation method has been proposed. Most of the conventional trust propagation methods are not applicable for trust evaluation of today's large trust graphs. Our trust propagation method...
We propose and present a framework for enabling policy-based routing in mobile ad hoc networks (MANETs) by applying policy rules associated with the security and reliability (of connection) to peer-to-peer security associations (SA) that are established on (multi-link) routes. In this proposal, we leverage and integrate the concept of dispersity routing with the management and maintenance of an existing...
In recent years, Peer to Peer system has shown tremendous growth enabling millions of concurrent users exchange information seamlessly. Kad is a Kademlia-based Distributed Hash Table implementation in real P2P applications which has millions of simultaneous users as to date. However, it comes with several vulnerable features which allow attacks, especially DDoS attacks. In this paper, we proposed...
A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication...
Security is one of the important P2P storage cloud issues. RCM (the Resource Chain Model) is a trust model for the security. One problem of RCM for P2P storage cloud to be considered is which the best path is for each neighbor. Usually, for each neighbor, it is possible to get more than one resource path and such resource paths can be good candidates for use. The most widely used and easiest tree...
Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development...
The open applications makes P2P network has many security problems. In order to improve the performance of network, and to ensure the quality of services, this paper proposes a trust model for fault-tolerant and intrusion-tolerant Mechanism of P2P networks. In this model, a new trust evaluation and management mechanism have been studied, and an updating method of the trust degree has been described...
Although Social Network Service (SNS) providers like Facebook and Google attempt to mitigate security and privacy-related concerns of their users, abuses and misuses of personal data still make the headlines. As centralized storage of personal data is a decisive factor for unintended information disclosure, several architectures for decentralized Online Social Networks (OSNs) have been proposed. System...
Following the continuous evolution of the Internet and related technologies, distributed and collaborative networked computing systems have become one of the increasingly considered fields of research. In order to realize the cooperation of nodes in distributed systems, trustworthy group formation is required to support cooperative activities of nodes like sharing of their computing power, storage...
In peer-to-peer networks (P2Ps), many autonomous nodes without preexisting trust relationships share resources (e.g., files) between each other. Due to their open environment, P2Ps usually employ reputation systems to provide guidance in selecting trustworthy resource providers for high system reliability and security. A reputation system computes and publishes reputation score for each node based...
In order to improve the sufficiency of software test, the concept of exception test case is put forward and analyzed by examples firstly in this paper, Secondly, since the obtaining method of exception test cases differs greatly to traditional security test cases, a distributed-storage method is proposed to store and share exception test cases on a P2P network. To realize sharing and reusing of exception...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.