Storage Area Networks Security Protocols and Mechanisms
نویسنده
چکیده
منابع مشابه
GSM Security II
Mobility of users, transmission of signals through open-air, the requirement of low power consumption by mobile users and smaller data storage area limitation in mobile equipment make mobile wireless networks more vulnerable to security threats like eavesdropping and unauthorized access. This paper proposes a new set of security protocols to enhance the access and data security features of GSM ...
متن کاملOptimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
The security requirements in Wireless Sensor Networks (WSNs) and the mechanisms to support the requirements, demand a critical examination. Therefore, the security protocols employed in WSNs should be so designed, as to yield the optimum performance. The efficiency of the block cipher is, one of the important factors in leveraging the performance of any security protocol. In this paper, therefo...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کامل