By Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba
This publication constitutes the refereed complaints of the foreign convention on Advances in safeguard of knowledge and verbal exchange Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised complete papers offered have been conscientiously reviewed and chosen from sixty two submissions. The papers are equipped in topical sections on networking protection; facts and data safety; authentication and privateness; safety functions.
Read or Download Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings PDF
Similar security books
Assurer l. a. sécurité de son habitation est à l. a. portée de tous mais, grâce à ce petit livre pratique, on ne se laissera plus décourager par los angeles variété ou l. a. complexité des matériels disponibles. Qu'il s'agisse de remplacer une serrure ou d'installer un système de vidéosurveillance on saura quoi faire et remark.
This publication constitutes the refereed court cases of the foreign Symposium on safety in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised complete papers awarded including 15 poster papers have been rigorously reviewed and chosen from 111 submissions. The papers disguise all elements of safe computing and conversation in networking and allotted structures reminiscent of cloud-based information facilities.
- Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
- Digital Archaeology: The Art and Science of Digital Forensics
- VoIP Hacks, Edition: 1st ed
- The EU-Russian Energy Dialogue: Europe's Future Energy Security (The International Political Economy of New Regionalisms Series)
- Japan’s Maritime Security Strategy: The Japan Coast Guard and Maritime Outlaws
Additional resources for Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings
Csn: a network protocol for serving dynamic queries in largescale wireless sensor networks. In: Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 165–174 (2004) 19. : Chord-based key establishment schemes for sensor networks. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 731–737 (2008) 20. : Securing mobile agent based wireless sensor network applications on middleware. In: International Conference on Communications and Information Technologies (ISCIT), October 2-5, pp.
Mobile agents suﬀer from three types of security threats , agent to host threat where the agent gains unauthorized access to the host resources and tampers with it, agent to agent threat and host to agent security threat where the host compromises the agent residing on it, which is considered to be the most diﬃcult attack to prevent since the host has a full control over the agent’s code and its data. Recent work has been done 30 A. Amer, A. A. e. code obfuscation, code encryption, white box cryptography, black box cryptography and code signing .
The use of asymmetric keys is nowadays feasible due to advances in WSN hardware. In this paper, Chord (A scalable peer to peer lookup service) is used for storing and looking up public keys in a clustered mobile agent WSN to protect sensor nodes from malicious agents. Cluster heads act as a distributed key storage and lookup facility forming a ring overlay network. Performance evaluation results through network simulation show that the proposed scheme provides eﬃciency and scalability in terms of key storage and lookup.