نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

2003
Vijay Bhuse Ajay Gupta Rishi Pidva

Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks. In this paper we present a scalable and distributed security protocol, DSPS, for WSN that fits in between the network and the transport layers. DSPS satisfies ...

2013
Tarunpreet Bhatia

Mobile Adhoc NETwork (MANET) is a collection of mobile nodes which can communicate directly with other nodes within its transmission range and use multihop routing for nodes outside its transmission range. The inherent features of MANETs like dynamic topology, limited network resources (bandwidth, memory and battery power) and lack of centralized trusted authority makes it more vulnerable to at...

2014
Neeru Yadav Anurag Jain

Recently when huge amount of documents and web contents are available, so security of data is somewhat difficult. Since most of the systems are based on the distributed network so the sharing of data and more important the security of data on such systems are important.It is a trend to store data in to third party servers for either sharing or cost effective storage. But this private data shoul...

2017
Abdul Wahab Ahmed Mian Muhammad Ahmed Omair Ahmad Khan Munam Ali Shah

Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT netwo...

2017
Mobeen Khan Muhammad Taha Jilani Muhammad Khalid Khan Maaz Bin Ahmed

In recent years, there is enormous growth of smart systems that have been developed for range of applications. This development is focused on Internet-ofThings (IoT), which will eventually, transform IoT into system of systems. Such smart systems are widely utilized in healthcare; however, the wide scope of such systems is also vulnerable to security and privacy issues. This paper proposes a se...

2011
Andrew Buhr Dale Lindskog Pavol Zavarsky Ron Ruhl

In this paper we describe three separate Media Access Control (MAC) address spoofing attacks that, when deployed in specific yet common layer 2 network topologies, circumvent Cisco’s port security. We show first that, with full knowledge of the network, the vendor recommended implementation of port security is both ineffective at preventing all three of these attacks, and actually decreases the...

2003
Stefaan Seys Bart Preneel

A distributed sensor network or DSN is an autonomous system of thousands of mobile devices connected by wireless links. The devices are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably. This paper gives an overview of the security aspects of these sensor networks, consisting of ultra-low power devices, with lim...

2011
S. Saed Rezaie S. Amir Hoseini H. Taheri

As wireless technology is becoming more and more prevalent; security in such networks is becoming a challenging issue and is in great demand. One of the most powerful tools in this area which helps to simulate and evaluate the behaviour of networks and protocols is OPtimised Network Engineering Tool (OPNET). Although OPNET has covered a wide range of models and a variety of protocols, there is ...

2017
Louise Axon Jason R. C. Nurse Michael Goldsmith Sadie Creese

Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations Centres (SOCs). Security analysts working in SOCs generally monitor networks using a combination of anomaly-detection techniques, Intrusion Detection Systems and data presented in visual and text-based forms. In the las...

2009
Naoki Satoh Hiromitsu Kumamoto

The information security risk assessment is investigated from perspectives of most advanced probabilistic risk assessment (PRA) for nuclear power plants. Accident scenario enumeration by initiating events, mitigation systems and event trees are first described and demonstrated. Assets, confidentiality, integrity, availability, threats, vulnerabilities, impacts, likelihoods, and safeguards are r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید