Showing 1 - 10 of 12
In this paper, a cluster-based hybrid security framework called HSFA for ad hoc networks is proposed and evaluated. The … proposed security framework combines both specification and anomaly detection techniques to efficiently detect and prevent wide … proposed security framework provides an adaptive response against attacks to prevent damage to the network. The security …
Persistent link: https://www.econbiz.de/10012045681
Data and document privacy concerns are increasingly important in the online world. In Cloud Computing, the story is the same, as the secure processing of personal data represents a huge challenge The main focus is to to preserve and protect personally identifiable information (PII) of...
Persistent link: https://www.econbiz.de/10012045682
isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the … is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for … solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and …
Persistent link: https://www.econbiz.de/10012045692
security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles …
Persistent link: https://www.econbiz.de/10012045695
Honeypots are the network sensors used for capturing the network attacks. As these sensors are solely deployed for the purpose of being attacked and compromised hence they have to be closely monitored and controlled. In the work presented in this paper the authors have addressed the problem of...
Persistent link: https://www.econbiz.de/10012045699
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices …
Persistent link: https://www.econbiz.de/10012045707
Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruder's activities by using snooping agents and honeypot on the network. The idea...
Persistent link: https://www.econbiz.de/10012045708
overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication …
Persistent link: https://www.econbiz.de/10012045713
high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article … discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysis on their … performance. After detailed analysis and comparison, it was observed that when security features are imposed at different levels …
Persistent link: https://www.econbiz.de/10012045714
and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also …
Persistent link: https://www.econbiz.de/10012045715