نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

2000
Madalina Baltatu Antonio Lioy

This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned, the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally, common IPsec applications are presented and the fu...

2016
Ki-Dong Kang Youngmi Baek Seonghun Lee Sang H. Son

In the age of smart and connected vehicles, there are significant issues in providing security for in-vehicle networking. Many security efforts for in-vehicle networks are still insufficient to build a lightweight security mechanism. Typically, it comes from the limitations of Controller Area Network (CAN) protocol common to in-vehicle network. We propose a lightweight authentication method bas...

2012
Andra Pradesh

The Wireless Sensor Network (WSN) increasingly becoming more practicable solution to many challenging applications. One of the major applications of the sensor networks is in military. So providing security is particularly challenging and its security mechanisms are also be the greatest concern to deploy sensor network such hostile unattended environments, monitoring real world applications. In...

2016
Jaskirat Singh Harpreet Kaur Saini

In a wireless network it is very important to provide the network security and quality of service. To achieve these parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM method and used to classify the traffic ...

2004
Yunfei Wu Stephan Wong

In this paper, we present an investigation into the challenges in designing a network processor that is additionally capable of security processing. First, we provide an overview of the cryptographic algorithms utilized in security processing and highlight several current network protocols that employ these algorithms. Second, we discuss several issues in designing a solution for security proce...

Journal: :CoRR 2014
Naser Alajmi

A few years ago, wireless sensor networks (WSNs) used by only military. Now, we have seen many of organizations use WSNs for some purposes such as weather, pollution, traffic control, and healthcare. Security is becoming on these days a major concern for wireless sensor network. In this paper I focus on the security types of attacks and their detection. This paper anatomizes the security requir...

2015
Mosad H Alkhathami

Wireless Sensors Network (WSN) combine sensing, signal processing, decision capability, and wireless networking capability in a compact, low power system. Among countries, border protection is a sensitive issue and measures are being taken to improve security at the borders. In addition to physical fencing, smart methods using technology are being employed to increase the alertness of security ...

2014
Anupriya Shrivastava M A Rizvi

Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...

2011
Dongwan Kang

Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrast...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید