Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








471,486 Hits in 4.6 sec

Security Requirements Analysis of ADS-B Networks

Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa, Alexandre Barreto
2014 Semantic Technologies for Intelligence, Defense, and Security  
We showcase our ideas using an ADS-B-related scenario developed to evaluate our research.  ...  In this paper, we propose a methodology that uses semantic technologies to address the security requirements definition from a systemic perspective.  ...  Examples of the latter include supporting trade-off analysis of adding security features against their associated cost, validation and verification of the actual system based on stakeholder requirements  ... 
dblp:conf/stids/KacemWCB14 fatcat:zz344tdh7fah3oprrncbwe6eca

Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)

Rakesh KumarSingh, Rajesh Joshi, Mayank Singhal
2013 International Journal of Computer Applications  
In this research paper, we will identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks.  ...  Although security issues in Mobile Ad-hoc Networks (MANETs) have been a major focus in the recent years, the development of most secure schemes for these networks has not been entirely achieved till now  ...  In this research, various security requirements for mobile ad hoc network will be explored and the different types of threats an ad hoc network faces.  ... 
doi:10.5120/11568-6871 fatcat:vvludfglabdrpdppxvdbagf7di

Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks

Falko Dressler
2008 International Journal of Network Security  
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community.  ...  Additionally, a typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths.  ...  The objective of this paper is to analyze the end to end communication in ad hoc networks and to provide a new solution to the requirement of secured communication in terms of ensuring the integrity of  ... 
dblp:journals/ijnsec/Dressler08 fatcat:6wu7r4zyqzcalg4yn73lppoyim

Assessing the Effectiveness of ADS-B Mitigations

Heinke Lubbe, Rudi Serfontein, Marijke Coetzee
2024 International Conference on Cyber Warfare and Security (ICIW)  
Most of these vulnerabilities are because ADS-B is designed to rely on wireless networks.  ...  This paper provides an in-depth analysis of the ADS-B threat landscape and potential mitigations to better understand their distinct characteristics and impact on the ADS-B system.  ...  ADS-B Threats Most ADS-B vulnerabilities result from the nature of the ADS-B architecture, as ADS-B is designed to rely on wireless networks.  ... 
doi:10.34190/iccws.19.1.2032 fatcat:kdnpbnlyancclknpqfyxncxv6u

Authentication in a layered security approach for mobile ad hoc networks

Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris
2007 Computers & security  
The layered security approach is described and design criteria for creating secure ad hoc network using multiple authentication protocols are analysed.  ...  Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected.  ...  of the Aegean".  ... 
doi:10.1016/j.cose.2006.12.011 fatcat:l5jf3f6gbnginmggbcsvyishji

Multifold node authentication in mobilead hoc networks

Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris
2007 International Journal of Communication Systems  
The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed.  ...  Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected.  ...  of the University of the Aegean".  ... 
doi:10.1002/dac.882 fatcat:25g4o7xp7rdnfi5elbjqhj5u4u

A Secure Approach to Autonomous Mobile Ad-Hoc Networks Using Superman Technique

A. Anne Linda
2022 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Mobile Ad-hoc Networks or MANETs are mostly found where any fixed facilities are not available and so it is dynamic. Secure transmission of data is an important aspect in MANET.  ...  To address these issues, a framework called Security Using Pre-Existing Routing for Mobile Ad-hoc Networks (SUPERMAN) [ 1 ] is proposed.  ...  Improvement in bandwidth and capacity is required for the nodes that are in the network. Large scale of Ad-hoc networks is a challenging issue.  ... 
doi:10.22214/ijraset.2022.41389 fatcat:j2lzyu7carhfxid7ydshvfxbla

Security and QoS relationships in Mobile Platforms [chapter]

Ana Nieto, Javier Lopez
2012 Lecture Notes in Electrical Engineering  
As a result of our analysis we provide parametric relationships between security and QoS parameters focusing on mobile platforms.  ...  Moreover, wireless capabilities open the door to several malicious devices, and mobility represents an added difficulty in the detection of malicious behavior and in the prevention of the same.  ...  Acknowledgments This work has been partially supported by the Spanish Ministry of Economy and Competitiveness through the projects SPRINT (TIN2009-09237) and IOT-SEC (ACI2009-0949), being the first one  ... 
doi:10.1007/978-94-007-5699-1_2 fatcat:26hwq4witfftvgwkg6avgjked4

UAS Traffic Management Communications: The Legacy of ADS-B, New Establishment of Remote ID, or Leverage of ADS-B-Like Systems?

Neno Ruseno, Chung-Yan Lin, Shih-Cheng Chang
2022 Drones  
In between these two systems, there is ADS-B-like communication which leverages using other types of communications available in the market for the purpose of UTM.  ...  In practice, there are two types of wireless communication systems established in the UAS community: automatic dependent surveillance broadcast (ADS-B) and remote identification (Remote ID).  ...  It is an improvement to the UTM-based, ADS-B-like communication architecture [16] to include ADS-B and new Remote ID technology.  ... 
doi:10.3390/drones6030057 fatcat:lr34tuqsczaqhns75xhw5nx4x4

A Framework for Secure Data Acquisition In VANET

Dr. B. Balakumar
2021 International Journal for Research in Applied Science and Engineering Technology  
Vehicular Ad-Hoc network is received a lot of interest in the couple years in the one of the networks.  ...  Keywords: VANET, RSU, Ad-Hoc Network, URE, ITS  ...  It shares general ad-hoc network security concerns and faces attack such as eavesdropping, traffic analysis and brute-force attacks.  ... 
doi:10.22214/ijraset.2021.38148 fatcat:tujlnt5gfnbsfehizfyfld2elq

A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms

Ana Nieto, Javier Lopez
2013 Journal on spesial topics in mobile networks and applications  
However, Security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the Future Internet makes coexistence even more difficult, posing new challenges  ...  The final aim of our contribution is to facilitate the development of secure and efficient services for mobile platforms.  ...  ⇒ (∇a → ∆b) (4) Complex Formulation Set (based on 1-4) D c :: (∆a → ∆b) ∧ (∇a → ∇b) ≡ aD + baD ¬+ b (5) D t :: aD c b ∧ bD c a (6) D ¬c :: (∆a → ∇b) ∧ (∇a → ∆b) ≡ aDbaD ¬− b (7) D i+ :: (∆a →  ... 
doi:10.1007/s11036-013-0462-y fatcat:a2equrgw3nfd7nr424xmjxqeha

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar
2015 International Journal of Computer Applications  
This paper provides an authenticated zero knowledge protocol which is very helpful in establishing secure wireless communication in ad-hoc networks by satisfying cryptographic goals such as authentication  ...  For a reliable secure communication, mutual entity authentication is very often seen as the necessity to the establishment of a secure connection.  ...  Security Analysis The vulnerability of the stated authentication protocol can be determined by the security analysis which is segregated into different parts.  ... 
doi:10.5120/ijca2015906437 fatcat:6fdtnmqejnehtodqdfvgnfdjia

Blockchain Methods for Trusted Avionics Systems [article]

Erik Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen
2019 arXiv   pre-print
chain of security blocks.  ...  As for an aerospace example, we address a notional example for Automatic dependent surveillance-broadcast (ADS-B) from Flight24 data (https://www.flightradar24.com/) to determine whether blockchain is  ...  ACKNOWLEDGEMENTS The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of Air  ... 
arXiv:1910.10638v1 fatcat:nazb556q7zexrmxadt3tedrrii

Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols

G. Sunayana, Sukrutharaj .M, Lalitha rani .N, M.B. Kamakshi
2012 International Journal of Computer Network and Information Security  
Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to the vulnerable nature of ad-hoc networks there are many security threats.  ...  Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic  ...  SECURITY REQUIREMENTS OF AD HOC NETWORKS A good secure routing algorithm prevents each of the exploits and it must ensure that no node can prevent successful route discovery and maintenance between any  ... 
doi:10.5815/ijcnis.2012.12.07 fatcat:i76lm5nttzbzbebt5aar53kh5e

Overview of Security Challenges and Needs in Vehicular Ad-Hoc Networks

Menal Dahiya
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Vehicle Ad-hoc networks (VANETs) is important form of mobile ad-hoc networks. The VANETs provide a smart transmission between vehicles and also among vehicle and roadside infrastructure.  ...  The era of vehicular ad-hoc network (VANETs) are receiving increasing attention from academia and deployment effort from industry.  ...  Hence successful deployment of vehicular networks will require incentives for vehicle manufacturers, consumers and the government is a challenge to implement security in VANET [6] III.  ... 
doi:10.23956/ijarcsse/sv7i5/0253 fatcat:3wa63kppsnakfpvrw3cqcvueva
« Previous Showing results 1 — 15 out of 471,486 results