The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
The increasing occurrence of large scale disasters calls out for a collaborative approach to crisis management, where multiple and heterogeneous organizations of first responders are deployed within the damaged area and must interact with each others in order to cooperate in the damage assessment and recovery actions. Such an approach requires a suitable communication platform to allow these organizations...
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
Nowadays one of the most important tasks in the field of network technologies is to ensure the data transmission, processing and storage security. In this paper, the idea of a new approach to the design of a distributed system for managing data flows and protecting computer networks from harmful effects is proposed. The main principles of this approach are considered, problems are set and ways of...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
Blockchain technology is being considered as one of the ultimate revolutions that will be able to disrupt several pillars of our society. It is a public and distributed ledger built for security and interoperability. Blockchain provides all parties a secure and synchronized record of immutable transactions assembled together and permanently stored with a fingerprint, creating therefore an irreversible...
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence...
Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation...
Fake identities and identity theft are issues whose relevance is increasing in the social network domain. This paper deals with this problem by proposing an innovative approach which combines a collaborative mechanism implementing a trust graph with keystroke-dynamic-recognition techniques to trust identities. The trust of each node is computed on the basis of neighborhood recognition and behavioral...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
This publication presents a novel concept for securing P2P-based M2M applications using the integration of a trust management system. In addition, this publication presents different security problems inside the P2P-based M2M application (P2P4M2M) framework and evaluates P2P protocols based on security. Furthermore, this paper emphasises the importance of trust for ensuring security. This is done...
Internet of Things (IoT) is a paradigm which has become extremely popular, with applications spanning from ehealth to industrial controls. IoT architectures are distributed and often based on constrained devices, which make challenging the task of introducing security mechanisms, in particular those requiring dynamic policy evaluation. In this paper we present UCIoT (Usage Control in IoT), a fault...
This paper puts forward a new trust model CTM (Credit Transfer Model) in the mobile P2P (Peer to Peer) network. Applying a hybrid P2P network topology structure, the CTM selects large servers in the cable network as super nodes which maintain the identity information, resource information, transaction records and trust information of ordinary nodes. The CTM simplifies the calculation of the node's...
The distributed storage systems (DSS) are constructed by large number of nodes which are interconnected over a network. Each node in the network is vulnerable and a potential risk of attack. The attackers can eavesdrop the nodes and possibly modify their data. Despite the considerable efforts, both in industry and in academia, high reliability and security remain major challenges in running large...
Vehicular Ad-hoc Networks (VANETs) is a research area focusing on improving road safety and traffic management. However, VANETs are still vulnerable to different kind of security attacks due to its infrastructure-less networking. Sybil Attack is a well-known attack in VANET. It forges multiple nodes with different identities to broadcast fake messages to manipulate the road traffic and information...
There has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of Things (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. This paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads...
Developing means of secure and trustful communications for Vehicular Social Networks (VSN) is essential to enable active information sharing among vehicles. Reputation-based trust management system is a popular security mechanism used in vehicular networks and proven to be robust in many other applications. In this paper, we propose a similarity-based bootstrapping method using analytic hierarchy...
Middleboxes are widely used in today's Internet, especially for security and performance. Middleboxes classify, filter and shape traffic, therefore interfering with application performance and performing new network functions for end hosts. Recent studies have uncovered and studied middleboxes in different types of networks. In this paper, we exploit a large-scale proxy infrastructure, provided by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.