9 research outputs found

    Evaluation of Path Recording Techniques in Secure MANET

    No full text
    1404-140

    Topology Reconstruction via Path Recording in Secure MANET

    No full text
    Abstract—The exchange of topology information is a poten-tial attack target in mobile ad-hoc networks. To provide an intrinsic security mechanism, it is possible to validate topology advertisements in the control plane against records of the path taken by transmission in the data plane. In this context, we provide a discussion of different path recording mechanisms. We evaluate their performance in terms of packet overhead and reconstruction complexity. I

    Internet of things: the concept, inherent security challenges and recommended solutions

    No full text
    The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosophy of the proposed research work is that existing cryptographic modelling will be required to be scaled down for its complexities by investigating the actual communication problems in security protocols between sensor nodes, Internet host, data centres, cloud clusters, virtual machines, etc. The inclusion of more operational actions while modelling security protocols is highly prioritised in the proposed research work. In this paper, the prime emphasis is (i) to establish secure pipelining using novel public-key cryptography between the sensor network and Internet host, (ii) a robust authentication scheme considering both local and global IoT to offer better secure pervasiveness in its applications, and (iii) to apply optimisation towards key management techniques
    corecore