Advances in Security of Information and Communication by Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba

By Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba

This booklet constitutes the refereed lawsuits of the overseas convention on Advances in defense of data and verbal exchange Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised complete papers provided have been rigorously reviewed and chosen from sixty two submissions. The papers are geared up in topical sections on networking protection; info and data protection; authentication and privateness; defense purposes.

Show description

Read Online or Download Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings PDF

Best security books

Electronic Security in Chile: A Strategic Reference, 2006

The first viewers for this document is managers concerned with the top degrees of the strategic making plans method and experts who aid their consumers with this job. The consumer won't merely enjoy the hundreds of thousands of hours that went into the method and its program, but additionally from its replacement standpoint on strategic making plans with regards to digital protection in Chile.

Security Assessment in Vehicular Networks

This e-book offers a number of novel methods to version the interplay among the attacker and the defender and examine the protection of Vehicular advert Hoc Networks (VANETs). the 1st safeguard evaluation strategy is predicated at the assault tree protection overview version, which leverages tree dependent how you can examine the danger of the process and determine the potential attacking ideas the adversaries may possibly release.

Hegemony and the Holocaust: State Power and Jewish Survival in Occupied Europe

This e-book explains why extra Jewish humans survived in a few German-occupied international locations in comparison to others in the course of international conflict II. Hollander demonstrates that collaborators occasionally performed a shocking function in making sure Jewish survival. the place high-ranking governing officers stayed of their international locations and helped Nazi Germany, they can usually “trade” their dependable cooperation in army and monetary affairs for inefficient or incomplete implementation of the ultimate resolution.

Additional resources for Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings

Example text

Section 2 highlights background and related work. Section 3 describes the proposed Chord-enabled key storage and lookup scheme. Section 4 illustrates performance evaluation results. Finally, the conclusion and the projected future work is covered in section 5. 2 Background and Related Work This section outlines relevant background and related work. 1, describes mobile agents and their advantages and applications. 2, shows the mechanism and methodology of the Chord algorithm. 3, illustrates the related work in focus.

Mobile agents have led to the existence of related security threats since the code moves from a node to another with its execution nature unlike the normal data transfer that does not affect the node by any means. Hence, security is an important concern when it comes to mobile agents migrating from a node to another in a WSN, where mobile agents may attack each other or the host itself and vice versa. However, authenticating these mobile agents requires requesting keys in every migration of the agent.

Consequently, distributed hash table (DHT) is utilized to store all nodes public keys using Chord keys distribution, which provide scalable, efficient keys storage and lookup, where all lookups are resolved via O(log N) messages, N is the number of nodes in the network [7], thereby minimizing the memory overhead and decreasing the communication cost. g. Chord, CAN, Pastry, Tapestry, Freenet, Gnutella, Oceanstore, and Ohaha system, but Chord is distinguishable due to its simplicity, provable correctness and performance.

Download PDF sample

Rated 4.94 of 5 – based on 8 votes