This paper presents a random asynchronous wakeup (RAW), a power saving technique for sensor networks that reduces energy consumption without significantly affecting the latency or connectivity of the network. RAW buil...
详细信息
This paper presents a random asynchronous wakeup (RAW), a power saving technique for sensor networks that reduces energy consumption without significantly affecting the latency or connectivity of the network. RAW builds on the observation that when a region of a shared-channel wireless network has a sufficient density of nodes, only a small number of them need be active at any time to forward the traffic for active connections. RAW is a distributed, randomized algorithm where nodes make local decisions on whether to sleep, or to be active. Each node is awake for a randomly chosen fixed interval per time frame. High node density results in existence of several paths between two given nodes whose path length and delay characteristics are similar to the shortest path. Thus, a packet can be forwarded to any of several nodes in order to be delivered to the destination without affecting much the path length and delay experienced by the packet as compared to forwarding the packet through the shortest path. The improvement in system lifetime, due to RAW, increases as the ratio of idle-to-sleep energy consumption increases, and as the density of the network increases. Through analytical and experimental evaluations, we show that RAW improves communication latency and system lifetime compared to current schemes.
This paper proposes a public microcellular network allowing extension of LAN to the mobile network, which is named mobile multimedia metropolitan area network (MM-MAN). Users driving at highspeed can enjoy the same IT...
详细信息
This paper proposes a public microcellular network allowing extension of LAN to the mobile network, which is named mobile multimedia metropolitan area network (MM-MAN). Users driving at highspeed can enjoy the same IT environment as in their office. This is one of the promising services of the 4G featuring IP-based high-bit-rate communications to fast terminals. The service requires secure VPN communications over the Internet section and wireless section to conceal business activities of users. Private IP addresses are used in the MM-MAN to veil the activity of the mobile user. The pre-shared secret keys, which are distributed from the VPN Server in the original home LAN are the basis to perform mutual authentication, registration and secure tunnel establishment for the mobile users in the MM-MAN. The established security associations (SA) are preserved unchangeably in an all IP cellular network during the movement of the mobile terminal across the microcells. The MM-MAN requires system-VLSI for intelligent base stations operated in each microcell allowing continuous packet transfer despite of frequent hand-offs. The base station is connected through PON (passive optical network), which is a kind of optical bus.
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if...
详细信息
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the abi...
详细信息
ISBN:
(纸本)0769519210
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the ability to perform distributed computations over networks composed of heterogeneous, resource constrained, unattended embedded systems. A key challenge that confronts SMs, however, is how to define a security architecture that protects both the SMs and the hosts, while preserving the SM benefits. In this paper we present a basic SM security architecture which sets up a framework for the security related issues of SMs and provides solutions for authentication, authorization, and secure SM migration. Since this paper is the first attempt to investigate the unique security challenges posed by a system based on mobile code executed over mobile ad hoc networks, we also discuss the main issues that remain to be solved for a more comprehensive SM security architecture.
Using our Alchemy research system as an exemplar system, we discuss different approaches to overcoming port-controlled security boundary limitations to geographically distributed computing environments while maintaini...
详细信息
ISBN:
(纸本)0769519156
Using our Alchemy research system as an exemplar system, we discuss different approaches to overcoming port-controlled security boundary limitations to geographically distributed computing environments while maintaining the inherent security provided by these boundaries. This discussion is relevant to a number of parallel/distributed strategies for grid and cluster architectures. It also provides insight into general security concerns in future distributed computing networks and how these may best be overcome.
The paper describes the formal approach and software toot "Attack Simulator" intended for active vulnerability assessment of computer network security policy at the stages of design and deployment of network...
详细信息
ISBN:
(纸本)0769520332
The paper describes the formal approach and software toot "Attack Simulator" intended for active vulnerability assessment of computer network security policy at the stages of design and deployment of network securitysystems. The suggested approach is based on stochastic grammar-based models of attacks and is realized via automatic imitation of remote computer network attacks of different complexity The paper characterizes the Attack Simulator architecture and the processes of generating malicious actions against computer network model and real-life computernetworks. The results of experiments that demonstrate the Attack Simulator efficiency are described in detail.
This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a ...
详细信息
ISBN:
(纸本)0769519210
This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxy-based security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, Access-controlled resource discovery that can scale to large numbers of resources and users.
When introducing public key infrastructure (PKI) in mobile telecommunication systems, one of the challenges is to span different PKI domains to establish certificate chain efficiently, and still keep the autonomy in l...
详细信息
ISBN:
(纸本)0769520332
When introducing public key infrastructure (PKI) in mobile telecommunication systems, one of the challenges is to span different PKI domains to establish certificate chain efficiently, and still keep the autonomy in local areas. The PKI model proposed in this paper improves the traditional PKI performance on above aspect.
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting th...
详细信息
ISBN:
(纸本)0769519210
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. In this paper, we present LHAP, a scalable and light-weight authentication protocol for ad hoc networks. LHAP is based on two techniques: (i) hop-by-hop authenti-cation for verifying the authenticity of all the packets transmitted in the network and (ii) one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes. We analyze the security of LHAP, and show LHAP is a lightweight security protocol through detailed performance analysis.
distributedsystems for computersecurity analysis must perform information fusion in order to construct a cyberspace situational awareness picture. To date such fusion has been conducted in the context of a single ab...
详细信息
ISBN:
(纸本)0972184449
distributedsystems for computersecurity analysis must perform information fusion in order to construct a cyberspace situational awareness picture. To date such fusion has been conducted in the context of a single abstraction set. As the complexity and heterogony increase, this approach becomes unwieldy. In a conceptual sense it is unscaleable. In this paper we describe an alternative approach, an architecture which supports concurrent reasoning in multiple sets of abstractions in a structured way. We present the architecture and a reasoning system for cyberspace situational awareness constructed using our approach.
暂无评论