Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "communication security" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
LoRaWAN Communication Implementation Platforms
Autorzy:
Szewczyk, Joanna
Nowak, Mariusz
Remlein, Piotr
Głowacka, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/2200714.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Long-Range (LoRa)
intelligent building
LPWAN
wireless network
security communication
Smart City
IoT
Opis:
A key role in the development of smart Internet of Things (IoT) solutions is played by wireless communication technologies, especially LPWAN (Low-Power Wide-Area Network), which are becoming increasingly popular due to their advantages: long range, low power consumption and the ability to connect multiple edge devices. However, in addition to the advantages of communication and low power consumption, the security of transmitted data is also important. End devices very often have a small amount of memory, which makes it impossible to implement advanced cryptographic algorithms on them. The article analyzes the advantages and disadvantages of solutions based on LPWAN communication and reviews platforms for IoT device communication in the LoRaWAN (LoRa Wide Area Network) standard in terms of configuration complexity. It describes how to configure an experimental LPWAN system being built at the Department of Computer Science and Telecommunications at Poznan University of Technology for research related to smart buildings.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 841--854
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Comparing Gausian and exact models of malicious interference in VLC systems
Autorzy:
Blinowski, Grzegorz
Mościcki, Adam
Powiązania:
https://bibliotekanauki.pl/articles/225996.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
visible light communication networks
network security
physical layer security
transmission jamming
Opis:
Visible Light Communication (VLC) is a technique for high-speed, low-cost wireless data transmission based on LED luminaries. Wireless LAN environments are a major application of VLC. In these environments, VLC is used in place of traditional systems such as Wi-Fi. Because of the physical characteristics of visible light, VLC is considered to be superior to traditional radio-based communication in terms of security. However, as in all wireless systems, the security of VLC with respect to eavesdropping, signal jamming and modification must be analyzed. This paper focuses on the aspect of jamming in VLC networks. In environments where multiple VLC transmitters are used, there is the possibility that one or more transmitters will be hostile (or "rogue"). This leads to communication disruption, and in some cases, the hijacking of the legitimate data stream. In this paper we present the theoretical system model that is used in simulations to evaluate various rogue transmission scenarios in a typical indoor enviro.The typical approach used so far in jamming analysis assumes that all disruptive transmissions may be modeled as Gaussian noise, but this assumption may be too simplistic. We analyze and compare two models of VLC jamming: the simplified Gaussian and the exact model, where the full characteristics of the interfering signal are taken into account. Our aim is to determine which methodology is adequate for studying signal jamming in VLC systems.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 277-286
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
Autorzy:
Hłobaż, Artur
Powiązania:
https://bibliotekanauki.pl/articles/2055243.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
secure communication
data encryption
data security
secure transmission
secure data exchange method
SDEx method
end-to-end data security
Opis:
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA-512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 1; 57--62
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies