Performance Evaluation of Security Algorithms in a Wi-Fi Testbed

Performance Evaluation of Security Algorithms in a Wi-Fi Testbed
Author: Kshitiz Saxena
Publisher: LAP Lambert Academic Publishing
Total Pages: 108
Release: 2012-05
Genre:
ISBN: 9783659132537

Download Performance Evaluation of Security Algorithms in a Wi-Fi Testbed Book in PDF, Epub and Kindle

In the IEEE 802.11 standard an optional encryption protocol called Wired Equivalency Privacy (WEP) is used to make wireless traffic as secure as wired network traffic. However it has been found that WEP suffers several weaknesses like a shared key weakness, no per-packet authentication, vulnerability to disassociation attacks, no user identification and authentication, no central authentication, authorization, and accounting support and vulnerability of RC4 to known plaintext attacks. To address these concerns, The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Wireless security is an exciting field of study, and we aim to find more weaknesses and new application areas of the attacks on TKIP. We hope that our work may contribute to motivate people to migrate their wireless security protocols to the more secure alternative CCMP.

Security, Design, and Architecture for Broadband and Wireless Network Technologies

Security, Design, and Architecture for Broadband and Wireless Network Technologies
Author: Chilamkurti, Naveen
Publisher: IGI Global
Total Pages: 384
Release: 2013-04-30
Genre: Technology & Engineering
ISBN: 1466639032

Download Security, Design, and Architecture for Broadband and Wireless Network Technologies Book in PDF, Epub and Kindle

While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.

IoT for Defense and National Security

IoT for Defense and National Security
Author: Robert Douglass
Publisher: John Wiley & Sons
Total Pages: 532
Release: 2023-01-04
Genre: Political Science
ISBN: 1119892201

Download IoT for Defense and National Security Book in PDF, Epub and Kindle

IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.

Handbook of Research on Wireless Security

Handbook of Research on Wireless Security
Author: Yan Zhang
Publisher: IGI Global
Total Pages: 860
Release: 2008-01-01
Genre: Technology & Engineering
ISBN: 1599049007

Download Handbook of Research on Wireless Security Book in PDF, Epub and Kindle

Provides research on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security.

Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas

Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas
Author: Somprakash Bandyopadhyay
Publisher: CRC Press
Total Pages: 210
Release: 2016-04-19
Genre: Computers
ISBN: 1420013238

Download Enhancing the Performance of Ad Hoc Wireless Networks with Smart Antennas Book in PDF, Epub and Kindle

A large portion of the network capacity of an ad hoc network can be wasted by the medium access mechanisms of omni-directional antennas. To overcome this problem, researchers propose the use of directional or adaptive antennas that largely reduce radio interference, improving the utilization of wireless medium and the resulting network throughput.

Novel Algorithms and Techniques in Telecommunications and Networking

Novel Algorithms and Techniques in Telecommunications and Networking
Author: Tarek Sobh
Publisher: Springer Science & Business Media
Total Pages: 502
Release: 2010-01-30
Genre: Technology & Engineering
ISBN: 9048136628

Download Novel Algorithms and Techniques in Telecommunications and Networking Book in PDF, Epub and Kindle

Novel Algorithms and Techniques in Telecommunications and Networking includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology and Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications and Networking includes selected papers form the conference proceedings of the International Conference on Telecommunications and Networking (TeNe 08) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2008).

Machine Learning Algorithms for Industrial Applications

Machine Learning Algorithms for Industrial Applications
Author: Santosh Kumar Das
Publisher: Springer Nature
Total Pages: 321
Release: 2020-07-18
Genre: Technology & Engineering
ISBN: 303050641X

Download Machine Learning Algorithms for Industrial Applications Book in PDF, Epub and Kindle

This book explores several problems and their solutions regarding data analysis and prediction for industrial applications. Machine learning is a prominent topic in modern industries: its influence can be felt in many aspects of everyday life, as the world rapidly embraces big data and data analytics. Accordingly, there is a pressing need for novel and innovative algorithms to help us find effective solutions in industrial application areas such as media, healthcare, travel, finance, and retail. In all of these areas, data is the crucial parameter, and the main key to unlocking the value of industry. The book presents a range of intelligent algorithms that can be used to filter useful information in the above-mentioned application areas and efficiently solve particular problems. Its main objective is to raise awareness for this important field among students, researchers, and industrial practitioners.

Advances in Network-Based Information Systems

Advances in Network-Based Information Systems
Author: Leonard Barolli
Publisher: Springer
Total Pages: 1195
Release: 2017-08-21
Genre: Technology & Engineering
ISBN: 3319655213

Download Advances in Network-Based Information Systems Book in PDF, Epub and Kindle

This book highlights the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. It includes the Proceedings of the 20th International Conference on Network-Based Information Systems (NBiS-2017), held on August 24–26, 2017 in Toronto, Canada. Today’s networks and information systems are evolving rapidly. Further, there are dynamic new trends and applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These networks are expected to manage the increasing number of users, provide support for a range of services, guarantee the quality of service (QoS), and optimize their network resources. In turn, these demands are the source of various research issues and challenges that have to be overcome – and which these Proceeding address.

Cloud Computing and Security

Cloud Computing and Security
Author: Xingming Sun
Publisher: Springer
Total Pages: 649
Release: 2016-11-03
Genre: Computers
ISBN: 3319486748

Download Cloud Computing and Security Book in PDF, Epub and Kindle

This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Author: Sagayam, K. Martin
Publisher: IGI Global
Total Pages: 405
Release: 2020-06-12
Genre: Computers
ISBN: 1799850692

Download Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks Book in PDF, Epub and Kindle

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.