32,909 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    A Survey on Attacks and Preservation Analysis of IDS in Vanet

    Get PDF
    Vehicular Ad-hoc Networks (VANETs) are the extremely famous enabling network expertise for Smart Transportation Systems. VANETs serve numerous pioneering impressive operations and prospects although transportation preservation and facilitation functions are their basic drivers. Numerous preservation allied VANETs functions are immediate and task imperative, which would entail meticulous assurance of preservation and authenticity. Yet non preservation associated multimedia operations, which would assist an imperative task in the future, would entail preservation assistance. Short of such preservation and secrecy in VANETs is one of the fundamental barriers to the extensive extended implementations of it. An anxious and untrustworthy VANET could be more hazardous than the structure without VANET assistance. So it is imperative to build specific that “life-critical preservation” data is protected adequate to rely on. Securing the VANETs including proper shield of the secrecy drivers or vehicle possessors is an extremely challenging assignment. In this research paper we review the assaults, equivalent preservation entails and objections in VANETs. We as well present the enormously admired common preservation guidelines which are based on avoidance as well recognition methods. Many VANETs operations entail system wide preservation support rather than individual layer from the VANETs’ protocol heap. This paper will also appraise the existing researches in the perception of holistic method of protection. Finally, we serve some potential future trends to attain system-wide preservation with secrecy pleasant preservation in VANETs. Keywords: VANET (Vehicular Ad-hoc Network), Routing algorithm, Vehicle preservation, IDS, attack, Secrec

    Flexible Session Management in a Distributed Environment

    Full text link
    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems

    Overlay networks for smart grids

    Get PDF
    • …
    corecore