A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Requirements Analysis of ADS-B Networks
2014
Semantic Technologies for Intelligence, Defense, and Security
We showcase our ideas using an ADS-B-related scenario developed to evaluate our research. ...
In this paper, we propose a methodology that uses semantic technologies to address the security requirements definition from a systemic perspective. ...
Examples of the latter include supporting trade-off analysis of adding security features against their associated cost, validation and verification of the actual system based on stakeholder requirements ...
dblp:conf/stids/KacemWCB14
fatcat:zz344tdh7fah3oprrncbwe6eca
Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)
2013
International Journal of Computer Applications
In this research paper, we will identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks. ...
Although security issues in Mobile Ad-hoc Networks (MANETs) have been a major focus in the recent years, the development of most secure schemes for these networks has not been entirely achieved till now ...
In this research, various security requirements for mobile ad hoc network will be explored and the different types of threats an ad hoc network faces. ...
doi:10.5120/11568-6871
fatcat:vvludfglabdrpdppxvdbagf7di
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
2008
International Journal of Network Security
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. ...
Additionally, a typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths. ...
The objective of this paper is to analyze the end to end communication in ad hoc networks and to provide a new solution to the requirement of secured communication in terms of ensuring the integrity of ...
dblp:journals/ijnsec/Dressler08
fatcat:6wu7r4zyqzcalg4yn73lppoyim
Assessing the Effectiveness of ADS-B Mitigations
2024
International Conference on Cyber Warfare and Security (ICIW)
Most of these vulnerabilities are because ADS-B is designed to rely on wireless networks. ...
This paper provides an in-depth analysis of the ADS-B threat landscape and potential mitigations to better understand their distinct characteristics and impact on the ADS-B system. ...
ADS-B Threats Most ADS-B vulnerabilities result from the nature of the ADS-B architecture, as ADS-B is designed to rely on wireless networks. ...
doi:10.34190/iccws.19.1.2032
fatcat:kdnpbnlyancclknpqfyxncxv6u
Authentication in a layered security approach for mobile ad hoc networks
2007
Computers & security
The layered security approach is described and design criteria for creating secure ad hoc network using multiple authentication protocols are analysed. ...
Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. ...
of the Aegean". ...
doi:10.1016/j.cose.2006.12.011
fatcat:l5jf3f6gbnginmggbcsvyishji
Multifold node authentication in mobilead hoc networks
2007
International Journal of Communication Systems
The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. ...
Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. ...
of the University of the Aegean". ...
doi:10.1002/dac.882
fatcat:25g4o7xp7rdnfi5elbjqhj5u4u
A Secure Approach to Autonomous Mobile Ad-Hoc Networks Using Superman Technique
2022
International Journal for Research in Applied Science and Engineering Technology
Abstract: Mobile Ad-hoc Networks or MANETs are mostly found where any fixed facilities are not available and so it is dynamic. Secure transmission of data is an important aspect in MANET. ...
To address these issues, a framework called Security Using Pre-Existing Routing for Mobile Ad-hoc Networks (SUPERMAN) [ 1 ] is proposed. ...
Improvement in bandwidth and capacity is required for the nodes that are in the network. Large scale of Ad-hoc networks is a challenging issue. ...
doi:10.22214/ijraset.2022.41389
fatcat:j2lzyu7carhfxid7ydshvfxbla
Security and QoS relationships in Mobile Platforms
[chapter]
2012
Lecture Notes in Electrical Engineering
As a result of our analysis we provide parametric relationships between security and QoS parameters focusing on mobile platforms. ...
Moreover, wireless capabilities open the door to several malicious devices, and mobility represents an added difficulty in the detection of malicious behavior and in the prevention of the same. ...
Acknowledgments This work has been partially supported by the Spanish Ministry of Economy and Competitiveness through the projects SPRINT (TIN2009-09237) and IOT-SEC (ACI2009-0949), being the first one ...
doi:10.1007/978-94-007-5699-1_2
fatcat:26hwq4witfftvgwkg6avgjked4
UAS Traffic Management Communications: The Legacy of ADS-B, New Establishment of Remote ID, or Leverage of ADS-B-Like Systems?
2022
Drones
In between these two systems, there is ADS-B-like communication which leverages using other types of communications available in the market for the purpose of UTM. ...
In practice, there are two types of wireless communication systems established in the UAS community: automatic dependent surveillance broadcast (ADS-B) and remote identification (Remote ID). ...
It is an improvement to the UTM-based, ADS-B-like communication architecture [16] to include ADS-B and new Remote ID technology. ...
doi:10.3390/drones6030057
fatcat:lr34tuqsczaqhns75xhw5nx4x4
A Framework for Secure Data Acquisition In VANET
2021
International Journal for Research in Applied Science and Engineering Technology
Vehicular Ad-Hoc network is received a lot of interest in the couple years in the one of the networks. ...
Keywords: VANET, RSU, Ad-Hoc Network, URE, ITS ...
It shares general ad-hoc network security concerns and faces attack such as eavesdropping, traffic analysis and brute-force attacks. ...
doi:10.22214/ijraset.2021.38148
fatcat:tujlnt5gfnbsfehizfyfld2elq
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms
2013
Journal on spesial topics in mobile networks and applications
However, Security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the Future Internet makes coexistence even more difficult, posing new challenges ...
The final aim of our contribution is to facilitate the development of secure and efficient services for mobile platforms. ...
⇒ (∇a → ∆b) (4) Complex Formulation Set (based on 1-4) D c :: (∆a → ∆b) ∧ (∇a → ∇b) ≡ aD + b ∧ aD ¬+ b (5) D t :: aD c b ∧ bD c a (6) D ¬c :: (∆a → ∇b) ∧ (∇a → ∆b) ≡ aD − b ∧ aD ¬− b (7) D i+ :: (∆a → ...
doi:10.1007/s11036-013-0462-y
fatcat:a2equrgw3nfd7nr424xmjxqeha
A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
2015
International Journal of Computer Applications
This paper provides an authenticated zero knowledge protocol which is very helpful in establishing secure wireless communication in ad-hoc networks by satisfying cryptographic goals such as authentication ...
For a reliable secure communication, mutual entity authentication is very often seen as the necessity to the establishment of a secure connection. ...
Security Analysis The vulnerability of the stated authentication protocol can be determined by the security analysis which is segregated into different parts. ...
doi:10.5120/ijca2015906437
fatcat:6fdtnmqejnehtodqdfvgnfdjia
Blockchain Methods for Trusted Avionics Systems
[article]
2019
arXiv
pre-print
chain of security blocks. ...
As for an aerospace example, we address a notional example for Automatic dependent surveillance-broadcast (ADS-B) from Flight24 data (https://www.flightradar24.com/) to determine whether blockchain is ...
ACKNOWLEDGEMENTS The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of Air ...
arXiv:1910.10638v1
fatcat:nazb556q7zexrmxadt3tedrrii
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols
2012
International Journal of Computer Network and Information Security
Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to the vulnerable nature of ad-hoc networks there are many security threats. ...
Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic ...
SECURITY REQUIREMENTS OF AD HOC NETWORKS A good secure routing algorithm prevents each of the exploits and it must ensure that no node can prevent successful route discovery and maintenance between any ...
doi:10.5815/ijcnis.2012.12.07
fatcat:i76lm5nttzbzbebt5aar53kh5e
Overview of Security Challenges and Needs in Vehicular Ad-Hoc Networks
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Vehicle Ad-hoc networks (VANETs) is important form of mobile ad-hoc networks. The VANETs provide a smart transmission between vehicles and also among vehicle and roadside infrastructure. ...
The era of vehicular ad-hoc network (VANETs) are receiving increasing attention from academia and deployment effort from industry. ...
Hence successful deployment of vehicular networks will require incentives for vehicle manufacturers, consumers and the government is a challenge to implement security in VANET [6] III. ...
doi:10.23956/ijarcsse/sv7i5/0253
fatcat:3wa63kppsnakfpvrw3cqcvueva
« Previous
Showing results 1 — 15 out of 471,486 results