By Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba

ISBN-10: 3642405967

ISBN-13: 9783642405969

This booklet constitutes the refereed court cases of the overseas convention on Advances in protection of data and communique Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised complete papers provided have been rigorously reviewed and chosen from sixty two submissions. The papers are geared up in topical sections on networking safeguard; info and data safety; authentication and privateness; defense purposes.

Show description

Read or Download Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings PDF

Best security books

Download PDF by Andrew Sheppard: Skype Hacks Tips & Tools for Cheap, Fun, Innovative Phone

If you may have heard approximately Skype - and who hasn't with all of the contemporary media consciousness dedicated to net mobilephone prone - likelihood is you have been robust tempted to aim it out. Skype Hacks tells you what all of the Skype hype is ready, explains the fundamentals, and exhibits you greater than a hundred smart information and tips for tweaking and tuning Skype to make it do exactly what you will want and extra.

Computer Security – ESORICS 2010: 15th European Symposium on by Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao (auth.), PDF

The EuropeanSymposium on Researchin computing device protection (ESORICS) has a convention that is going again 20 years. It attempts to assemble the overseas study neighborhood in a finest occasion that covers the entire components of computing device defense, starting from concept to functions. ESORICS 2010 used to be the fifteenth variation of the development.

Extra info for Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings

Sample text

11] have shown that mobile agents have three modes of communication: (1) agent to node: agent accessing the data of the node it’s moving or migrating to; (2) agent to agent: agents exchanging messages between them either locally or remotely; (3) node to agent: node accessing the resources of the agent residing on it. Despite the great additions of mobile agents to WSN technology, the presence of these agents dispatched by users with different objectives imposes some security threats. Mobile agents suffer from three types of security threats [12], agent to host threat where the agent gains unauthorized access to the host resources and tampers with it, agent to agent threat and host to agent security threat where the host compromises the agent residing on it, which is considered to be the most difficult attack to prevent since the host has a full control over the agent’s code and its data.

Only cluster heads are responsible for implementing the Chord keys lookup on behalf of other nodes (their cluster members) since they have a higher residual energy in order not to consume all nodes power and resources. 3. Cluster heads act as a distributed key storage and lookup facility, storing sensor nodes’ keys to avoid having a single point of failure, target to attacks and decreasing the communication overhead of contacting a centralized node or the base station. Finally, it has been proven that Chord’s efficiency and scalability is remarkable when it comes to distributing large number of keys over smaller number of nodes [7].

If the two hashes are not the same, the code is proven to be unauthorized/illegal agent’s code and will not have the authority to access the resources or execute on the target node. However, signing the code is done only once by the MAP of Base station (dispatcher) and verified at every receiving node’s MAP. (1) S = EP RBS (H(C))||C 34 A. Amer, A. A. El-Nasr S: Transmitted Signature EP RBS : Encryption with the base station private key H: Hash function (SHA-1) C: Agent’s code Fig. 3. Signing and verifying agent’s data/state Phase 2: Signing and Verifying Agent’s Data/State Sent from Node B to Node A.

Download PDF sample

Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings by Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba


by Donald
4.0

Rated 4.26 of 5 – based on 23 votes