A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
SOS - Securing Open Skies
[article]
2018
arXiv
pre-print
In this paper we propose Securing Open Skies (SOS), a lightweight and standard-compliant framework for securing ADS-B technology wireless communications. ...
Further, SOS is standard compliant and able to reject active adversaries aiming at disrupting the correct functioning of the communication system. ...
Airlines and British Airways), in this paper we proposed SOS, a lightweight and standard-compliant framework designed to guarantee the authenticity of the communications in the ADS-B technology. ...
arXiv:1809.09026v2
fatcat:hohlvm4iwffbdfpuib7nxyqxdu
Improved Security Performance for VANET Simulations
2016
IFAC-PapersOnLine
Upcoming deployments of Vehicular Ad Hoc Networks (VANETs) in Europe are expected to sign and verify packets secured by cryptographic signatures by default. ...
This paper presents a standard compliant simulation model capable to handle secured messages. ...
Seidler, and Sebastian Urich. ...
doi:10.1016/j.ifacol.2016.11.173
fatcat:2gcsxgsffbe3tg3lgurgngt6ry
Overview on Selective Encryption of Image and Video: Challenges and Perspectives
2008
EURASIP Journal on Information Security
This computation saving is very desirable especially in constrained communications (real-time networking, high-definition delivery, and mobile communications with limited computational power devices). ...
The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security. ...
(f) Format compliance: no format compliant; the encoder does not use standard wavelet packet decomposition. (g) Error tolerance: the avalanche effect of AES cipher causes poor error tolerance. ...
doi:10.1155/2008/179290
fatcat:edxyot6bf5dshmhltumubf7fru
Holistic Air Protection (HAP) scheme of ADS-B Communication
2019
IEEE Access
The avionics world is making the transition in the coming years to the automatic dependent surveillance-broadcast (ADS-B) communication in order to determine parameters like for instance position and velocity ...
Moreover, HAP is also able to obtain faster authentication and a thus faster guarantee of a verified update. INDEX TERMS ADS-B, TESLA, broadcast communication, ECQV, signcryption, authentication. ...
ADS-B has been standardized since many years. ...
doi:10.1109/access.2019.2917793
fatcat:ep72vylpabdjpkputu6mc655mm
A secure ad-hoc routing approach using localized self-healing communities
2005
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '05
For instance, since packet loss is common in mobile wireless networks, the adversary can exploit this fact by hiding its malicious intents using compliant packet losses that appear to be caused by environmental ...
In this paper we study two routing attacks that use non-cooperative network members and disguised packet losses to deplete ad hoc network resources and to reduce ad hoc routing performance. ...
(RREP packet and data packet loss) A malicious or selfish node may cause the loss of certain critical packets. ...
doi:10.1145/1062689.1062722
dblp:conf/mobihoc/KongHYPLG05
fatcat:hq7ndasi4ffyvemibby5d5toke
An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks
2007
IEEE transactions on multimedia
, given specific authentication overhead and knowledge of network loss rate. ...
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. ...
Digital Television and JPEG-2000 Security (JPSEC) standards. ...
doi:10.1109/tmm.2006.886281
fatcat:4j3g3z5flfaipc445phoo6gf6i
Adaptive security provisioning for vehicular safety applications
2017
International Journal of Space-Based and Situated Computing (IJSSC)
The second technique is transmitter based that can adaptively select the best security level for BSMs according to cryptographic loss rate. ...
Simulation results verify the performance enhancement achieved by the proposed framework in terms of several safety awareness metrics as compared with the existing schemes. for efficient communications ...
Finally, our framework operates on top of the VANETs MAC layer (e.g. IEEE 802.11p, or 4G/LTE), and is fully compliant with the WAVE IEEE 1609 (US) (2) and ETSI TC ITS (European) (3) standards. ...
doi:10.1504/ijssc.2017.084120
fatcat:ietmptuyizdaph3uwhbpylopg4
Investigational Security Structural Design Using Client and Server Ambitious Protocols for WMN
2015
International Journal of Informatics and Communication Technology (IJ-ICT)
control for mesh users and routers as well as a key distribution schemes that supports layer-2 encryption to ensure security and data confidentiality of all communications that occur in the WMN. ...
In order to provide a better understanding of the research challenges of WMNs, In this paper we propose MobiSEC, a complete security architecture protocols and algorithms for WMNs that provides both access ...
control for end-users and mesh routers as well as security and integrity of all data communications that occur in the WMN. ...
doi:10.11591/ijict.v4i1.pp13-22
fatcat:zm2ydqpddvf4hkotxb72rq2pj4
Improvements on "IP – IAPP": A fast IP handoff protocol for IEEE 802.11 wireless and mobile clients
2006
Wireless networks
Certain extensions have also been incorporated to the initial proposal, for the provision of more advanced services: (a) secure inter-AP IP-IAPP communications, (b) zero patching on the clients s/w, and ...
the existing 802.11 wireless LAN framework. ...
More specifically, the FA triggers ARP cache update by the client, and in so doing reduces packet loss during handover as it shortens the restoration time for any active sessions.
B. ...
doi:10.1007/s11276-006-9202-6
fatcat:ko5lhxphvfa27a4zc3g5og5qnm
REFRAHN: A Resilience Evaluation Framework for Ad Hoc Routing Protocols
2015
Computer Networks
This framework, called REFRAHN (Resilience Evaluation FRamework for Ad Hoc Networks), can be used to (i) reduce the uncertainty about the sources of perturbations in the deployment of ad hoc routing protocols ...
This variation depends on factors such as the way the driver provider interprets the standard specification for a given operating system and/or the presence of perturbations, such as multi-path interference ...
Acknowledgements This work was supported in part by the Spanish Project ARENES under Grant TIN2012-38308-C02-01 and in part by the Programa de Ayudas de Investigacin y Desarrollo through the Universitat ...
doi:10.1016/j.comnet.2015.02.032
fatcat:qjugmfpxa5holplbve7biie6e4
Wireless Sensor Networks: Techniques for Detecting Faults using Artificial Intelligence
2019
International Journal for Research in Applied Science and Engineering Technology
The sensor hubs have diverse power and computational limitations. ...
Amid the improvement of WSN arrangements it is important to consider five key attributes: versatility, wellbeing, unwavering quality, self-fix and vigor. ...
To do so, communication endpoints must provide for loss, duplication, reordering, and corruption of packets, so that these conditions do not damage data integrity and only reduce the performance of a proportional ...
doi:10.22214/ijraset.2019.4241
fatcat:rmhu5okzfnhzdi7fkbjhe5wccq
Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development
2016
International Journal of Automation and Computing
Comparison of high-speed wireless communication technologies for vehicular networks Many high-speed wireless access technologies and standards have been suggested, recommended and considered for use in ...
Advances in Vehicular Ad-Hoc Networks (VANETs): Challenges and Road-map for Future Development system (GPS) or differential global positioning system (DGPS) receiver [17] . ...
The authors would like to thank EBSG for the financial support as well as the anonymous reviewers for their critical reading, priceless comments, constructive criticism and suggestions which have undeniably ...
doi:10.1007/s11633-015-0913-y
fatcat:5nrpxpiuiba2bo72veap3gcdfa
Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs
2020
Sensors
Moreover, existing smartphone-based platforms do not consider two crucial requirements in VANETs, namely, multi-hop communication and the provision of security services in the message dissemination process ...
However, practical useful realizations of VANETs are still missing, mainly because of the elevated costs and the lack of a final standardization. ...
GPS Provider Security Relay Selection Error (%) Packet Loss A-B (%) Packet Loss B-C (%) Packet Loss C-A (%)
Impact of the Security Scheme The implemented ACSS security scheme can perform bilinear pairings ...
doi:10.3390/s20020330
pmid:31936004
pmcid:PMC7013670
fatcat:37xokz4ozjbxdnw4l5wztq2hq4
An Evaluation of Media-Oriented Rate Selection Algorithm for Multimedia Transmission in MANETs
2005
EURASIP Journal on Wireless Communications and Networking
This mechanism called media-oriented rate selection algorithm (MORSA) targets loss-tolerant applications such as VoD that do not require full reliable transmission. ...
In particular, we propose a simple and efficient cross-layer mechanism that considers both the channel conditions and characteristics of the media for dynamically selecting the transmission mode. ...
The authors would also like to thank Kave Salamatian and Ramin Khalili (Laboratoire d'Information de Paris 6 (LIP6), FRANCE) for their help in channel modeling for 802.11a WLANs. ...
doi:10.1155/wcn.2005.757
fatcat:7yrue4dz5zhr7jpuzc63kculmu
Fusion of digital television, broadband Internet and mobile communications—Part II: Future service scenarios
2007
International Journal of Satellite Communications And Networking
For satellite service scenarios, it also takes into consideration mobility management and standard quality-of-service mechanism issues, such as integrated services and differentiated services. ...
Review of the current state-of-the-art technologies consisting of integration of broadband Internet and mobile communications and integration of broadband Internet and DVB are given. ...
ACKNOWLEDGEMENTS This work has been performed by members of the Satellite Communications Network of Excellence (SatNEx) project, which is supported by the European Commission under the Sixth Framework ...
doi:10.1002/sat.880
fatcat:krwwj7r7yzfb5hn5bycmsykpcu
« Previous
Showing results 1 — 15 out of 1,965 results