نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
The wireless sensor network is an emerging technology in the field of communication. This technology has many advantages but the security issues have been not given much consideration till now. Due to this neglecting, few loopholes in the security have started to occur such as wormhole attack, blackhole attack, etc. In this paper the various aspects have been covered regarding security provisio...
Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, we need to encapsulate it in UDP (User datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection. So for proper securing and fully functionality of NAT traversal, it should be IP Security Protected. P...
MANET is the collection of various wireless mobile nodes. Security is of high concern in mobile ad hoc network as it has no centralized authority which can oversee the particular node working in the network. The attacks can be preformed from both inside and outside the network. Nodes within surrounding to gain common radio link can be often used to set up ad hoc infrastructure. But the safe com...
While the novelty of Software-Defined Networking (SDN) — the separation of network control and data planes — is appealing and simple enough to foster massive vendor support, the resulting impact on the security of communication networks infrastructures and their management may be tremendous. The paradigm change affects the entire networking architecture. It involves new IP-based management comm...
honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. most of the present honeypots are configured and installed on the network statically. in some cases considerations have been made on dynamic configuration of honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...
Internet of Things (IoT) is a network of physical objects connected to internet. Physical objects embedded with RFID, sensor and so on which allows object to communicate with each other. The physical objects are provided with unique identifier. Since the IoT is highly heterogeneous, security is a big challenge in IoT. In this paper we analyzed the various security requirements and challenges in...
In recent years, it has been proposed security architecture for sensor network.[2][4]. One of these, TinySec by Chris Kalof, Naveen Sastry, David Wagner had proposed Link layer security architecture, considering some problems of sensor network. (i.e : energy, bandwidth, computation capability,etc). The TinySec employs CBC_mode of encryption and CBC-MAC for authentication based on SkipJack Block...
Network security and authentication are very important for all kinds of communication networks to assure network stability and to avoid subscription fraud. In the last years – even for wireless local area networks – mechanisms have been found to support both in a cellular network. In multi–hop networks based on IEEE802.11, security and authentication are still open issues. Mainly the low price ...
Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Mal...
Today the demand for secure transfers of digital images , cryptanalysis and network security is a growing field. In this paper the security of RCES is analyzed and observed that it is insecure against the known/chosen-plaintext attacks .Here two seeds are generated chaotically and XOR’ed with plain image to get cipher image . The security of RCES against the bruteforce attack was overestimated....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید