Advances in Security of Information and Communication by Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba

By Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba

This publication constitutes the refereed complaints of the foreign convention on Advances in safeguard of knowledge and verbal exchange Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised complete papers offered have been conscientiously reviewed and chosen from sixty two submissions. The papers are equipped in topical sections on networking protection; facts and data safety; authentication and privateness; safety functions.

Show description

Read or Download Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings PDF

Similar security books

La sécurité dans la maison (L'artisan de sa maison)

Assurer l. a. sécurité de son habitation est à l. a. portée de tous mais, grâce à ce petit livre pratique, on ne se laissera plus décourager par los angeles variété ou l. a. complexité des matériels disponibles. Qu'il s'agisse de remplacer une serrure ou d'installer un système de vidéosurveillance on saura quoi faire et remark.

Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings

This publication constitutes the refereed court cases of the foreign Symposium on safety in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised complete papers awarded including 15 poster papers have been rigorously reviewed and chosen from 111 submissions. The papers disguise all elements of safe computing and conversation in networking and allotted structures reminiscent of cloud-based information facilities.

Additional resources for Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013 Cairo, Egypt, September 2013 Proceedings

Example text

Csn: a network protocol for serving dynamic queries in largescale wireless sensor networks. In: Second Annual Conference on Communication Networks and Services Research, May 19-21, pp. 165–174 (2004) 19. : Chord-based key establishment schemes for sensor networks. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 731–737 (2008) 20. : Securing mobile agent based wireless sensor network applications on middleware. In: International Conference on Communications and Information Technologies (ISCIT), October 2-5, pp.

Mobile agents suffer from three types of security threats [12], agent to host threat where the agent gains unauthorized access to the host resources and tampers with it, agent to agent threat and host to agent security threat where the host compromises the agent residing on it, which is considered to be the most difficult attack to prevent since the host has a full control over the agent’s code and its data. Recent work has been done 30 A. Amer, A. A. e. code obfuscation, code encryption, white box cryptography, black box cryptography and code signing [13].

The use of asymmetric keys is nowadays feasible due to advances in WSN hardware. In this paper, Chord (A scalable peer to peer lookup service) is used for storing and looking up public keys in a clustered mobile agent WSN to protect sensor nodes from malicious agents. Cluster heads act as a distributed key storage and lookup facility forming a ring overlay network. Performance evaluation results through network simulation show that the proposed scheme provides efficiency and scalability in terms of key storage and lookup.

Download PDF sample

Rated 4.18 of 5 – based on 8 votes