scholarly journals A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks

2003 ◽  
Vol 10C (1) ◽  
pp. 1-10
Author(s):  
Dharminder Dharminder ◽  
Dheerendra Mishra ◽  
Joel J. P. C. Rodrigues ◽  
Ricardo de A. L. Rabelo ◽  
Kashif Saleem

Technological advancement in the design of wireless communication have propelled an active interest in the field of Wireless Networks, Wireless Sensor Networks (WSNs), and Mobile Adhoc Networks (MANETs). Now days the speed and privacy are more reason of concern than the performance. The attacks can occur and there is always a chance that it will be a success. One of the major problems with Wireless Network security is that, all types of attacks are not known, and new ones emerge constantly [6]. Moreover, there is also a range of attacks that can be launched in the different mode, and thus making it more difficult for the Intrusion Detection System (IDS) to detect them. Therefore, main approach in network security is to detect and remove malicious intrusions. In this paper three different techniques have been proposed for securing Wireless LAN, WSNs and MANETs.


Author(s):  
Mükremin Özkul ◽  
Ilir Çapuni

Besides being expensive, traffic violation monitoring systems rely heavily on a huge infrastructure that incurs installation, operational, and maintenance costs. Developing countries — where people do exhibit less traffic safety aware- ness — deployment of such systems becomes a daunting task. A police- men cannot be everywhere, and a policeman can also be bribed. With the above goals in mind, in this paper we present an infrastructure- less and police-less traffic violation detection system that relies solely on the broadcast messages between the vehicles and secure communication of the vehicles with the transportation authority. Each vehicle should be equipped with a small board box (or a smartphone) with a wifi antenna and 3G capability and subscription. The system is highly scalable and can include pedestrians with smartphones. It is active and operational wherever and whenever there are two participants in the range of each other. Each participant has two roles to bear simultaneously. The first one is to report and prove its location to the transportation authority. The second one is to report the presence of other vehicles in the neighborhood to the transportation authority and flag those that disobey the traffic rules acting as trustworthy and anonymous witnesses. This is a preliminary report on a still ongoing research project.


2018 ◽  
Vol 12 (3) ◽  
pp. 304-309 ◽  
Author(s):  
Daojing He ◽  
Sammy Chan ◽  
Mohsen Guizani

Sign in / Sign up

Export Citation Format

Share Document