The increased and widespread usage of digital multimedia has aroused great concerns regarding issues such as copyright protection, copy control and proof of ownership. Digital watermarking serves as a solution to thes...
详细信息
The increased and widespread usage of digital multimedia has aroused great concerns regarding issues such as copyright protection, copy control and proof of ownership. Digital watermarking serves as a solution to these kinds of problems; however, digital watermarking techniques have demonstrated to possess vulnerabilities. Thus opening avenues for malicious attackers to abuse these security breaches. Therefore, maintaining the security of digital watermarked media i.e. text, image, audio and video has received considerable attention. This paper has conducted a comprehensive research with special emphasis on the classification of malicious attacks against digital watermarking. Subsequently, it reviews the current countermeasures available to mitigate the intentional attacks. In addition, it procures a foundation for the evaluation of various watermarking algorithms.
This paper presents “DynFire,” a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, with par...
详细信息
This paper presents “DynFire,” a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, with particular focus on mobile users and users with restricted rights, such as subcontractors. The basic assumption behind DynFire is that, within a secured network domain separated from the Internet, we can establish a temporary binding between an IP address and a single user ID. Whenever a user connects to or disconnects from this secure network domain, firewalls are configured accordingly, using a centralized “Firewall Manager” and standardized signaling protocols.
As personal devices become smarter, opportunities arise for sharing services, applications and data between them. While web technologies hold the promise of being a unifying layer, browsers lack functionality for supp...
详细信息
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-...
详细信息
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-centric and adaptable towards the needs and capabilities of the people in need of care. The continuous integration of leading-edge technologies, such as cloud and wireless communication technologies, in the context of the Internet of the Things (IoT), can meet this requirement by enabling a new form of communication between frail and elderly people, their environment and relevant groups of care givers. However, for IoT-based systems to reach their full potential, sound answers need to be provided to the important security questions arisen, particularly those regarding authentication of entities (people and environmental objects) and data privacy. This paper presents a system based on Gateways (GW) that aggregate health sensor data and resolve security issues through digital certificates and PKI data encryption.
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (Io...
详细信息
ISBN:
(纸本)9781467313285
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (IoT) concept is a new trend for efficient managing and processing of sensor data online. This paper presents a platform based on Cloud Computing for management of mobile and wearable healthcare sensors, demonstrating this way the IoT paradigm applied on pervasive healthcare.
In wireless orthogonal frequency division multiplexing (OFDM) systems, the knowledge of signal-to-noise ratio (SNR) plays an important role for system optimization. Most of the exiting literatures have studied the SNR...
详细信息
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape...
详细信息
We present a realistic, yet computationally inexpensive simulation model for IEEE 802.11p radio shadowing in urban environments. Based on real world measurements using IEEE 802.11p/DSRC devices, we estimated the effec...
详细信息
Mobile ad hoc network (MANET) is a wireless network that consists of a large number of mobile and heterogeneous nodes interconnected by wireless links which move in an arbitrary direction with random velocity. It is c...
详细信息
ISBN:
(纸本)9781457720529
Mobile ad hoc network (MANET) is a wireless network that consists of a large number of mobile and heterogeneous nodes interconnected by wireless links which move in an arbitrary direction with random velocity. It is characterized by the absence of any pre-existing infrastructure. This makes the transmission more difficult especially, in the case of multicast mode. Some of the most important applications that use the MANETs are the multimedia and real time systems. They require a very high level of quality of service (QoS) to make the network useful. In this paper, we propose a new QoS multicast routing protocol called MQBM for MANETs inspired by the bees' communication. It allows finding routes between the source and the head of multicast group responsible to communicate the packet toward the group members. Each node is allowed to transmit data only if the average end-to-end delay and the average bandwidth satisfy the QoS requirements. Extensive simulation results obtained using NS2 simulator, demonstrate the efficiency and the performance of the proposed protocol after comparisons against MAODV in terms of the average end-to-end delay and the average bandwidth as QoS metrics.
暂无评论