Iran Telecommunication Research Center

Displaying 1-14 of 14 results

  • White Papers // Jan 2011

    Private Identification, Authentication and Key Agreement Protocol With Security Mode Setup

    Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper the authors consider UMTS AKA and some other proposed schemes. Then the authors explain the known...

    Provided By Iran Telecommunication Research Center

  • White Papers // Dec 2010

    Backplane Serial Signaling and Protocol for Telecom Systems

    In this paper, the authors implement a modern serial backplane platform for telecommunication inter-rack systems. For combination high reliability and low cost protocol property, they applied High-level Data Link Control (HDLC) protocol with Low Voltage Differential Signaling (LVDS) bus for card to card communicated over backplane. HDLC protocol is a...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2010

    Safety Technologies Impacts Survey in M-Services Security Provision

    Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the m-services area is the security issue. Different...

    Provided By Iran Telecommunication Research Center

  • White Papers // Apr 2010

    Characterizing MEGACO Security in the presence Diameter Server

    In this paper, the authors analyze performance of MEGACO (MEdia GAteway COntrol protocol) based on Diameter which is an Authentication, Authorization and Accounting (AAA) protocol developed within the Internet Engineering Task Force (IETF). Diameter is loosely based on Remote Authentication Dial In User Service (RADIUS), which has previously been used...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2009

    An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP)

    Forecasting the unknown and detecting the known threats and targeted attacks are the most concern of network security especially in large scale environment. The authors have presented an intrusion detection and prediction system using cooperative co-evolutionary immune system for distributed data networks. This is an intelligent technique based on genetic...

    Provided By Iran Telecommunication Research Center

  • White Papers // Oct 2009

    Delay Calculation of Internet Traffic in Mobile Systems

    An important QoS factor for wireless network planning is delay. The authors should provide enough resources (Bandwidth) for conveying the traffic load. Next generation a wireless network is going to be an all IP network. In this path, voice will be changed to packet. In this paper they introduce a...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2009

    A Combined Method for Detecting Spam Machines on a Target Network

    The HITS and PageRank algorithms and K-Means clustering algorithm are two main methods for detecting spam machines. In PageRank algorithm, it is proposed to calculate weights based on different factors. Correct selection of weights has important role in the accuracy of the algorithm. This paper proposes a good method for...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jun 2009

    A Novel Plausible Deniability Scheme in Secure Steganography

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2008

    Nodes' Credit Based Directed Diffusion for Wireless Sensor Networks

    For data gathering in wireless sensor networks, sensors extract useful information from environment; this information has to be routed through several intermediate nodes to reach the destination. How information can effectively disseminate to the destination is one of the most important tasks in sensor networks. Problem arises when intermediate nodes...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2008

    Optimal Resource Allocation in Next Generation Network Services Using Engineering Optimization With Linear Constraint Particle Swarm

    This paper considers the problem of pricing for optimal resource allocation service using Engineering Optimization with Particle Swarm algorithm that ensures efficient resource allocation that provides guaranteed quality of service while maximizing profit in multiservice networks. The author formulates the generalized optimization algorithm based on the notion of a "Profit...

    Provided By Iran Telecommunication Research Center

  • White Papers // Oct 2008

    Scenarios for Testing Reliable Transmission of Provisional Responses in SIP User Agent

    In this paper, the authors present testing scenarios for reliable transmission of provisional responses in SIP user agent. Several test scenarios for different functionalities of SIP user agent have been presented by European Telecommunications Standards Institute (ETSI). However, no scenarios have been given for reliable transmission of provisional responses. Scenarios...

    Provided By Iran Telecommunication Research Center

  • White Papers // Sep 2008

    Design and Implementation of a Fast VOQ Scheduler for a Switch Fabric

    The technical manufacturing, which is based on Switch Fabric and VOQ (Virtual Output Queuing), is used in speedy routers, which are used in core network. For configuring of Switch Fabric having speedy scheduler with high Throughput is required. The most promising algorithm is iSLIP which is an iterative algorithm that...

    Provided By Iran Telecommunication Research Center

  • White Papers // Aug 2008

    Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

    Intrusion Detection Systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems. Anomaly-based approaches in Intrusion Detection Systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2008

    Malware Fuzzy Ontology for Semantic Web

    The term malware, in the area related to computer science, is used to define malicious code which is designed and written to execute attacks on software systems. In this paper, after a quick review of malact ontology, malware ontology is presented. Malwares include viruses, worms, botnets, spywares, backdoors, trojan horses,...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2009

    An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP)

    Forecasting the unknown and detecting the known threats and targeted attacks are the most concern of network security especially in large scale environment. The authors have presented an intrusion detection and prediction system using cooperative co-evolutionary immune system for distributed data networks. This is an intelligent technique based on genetic...

    Provided By Iran Telecommunication Research Center

  • White Papers // Apr 2010

    Characterizing MEGACO Security in the presence Diameter Server

    In this paper, the authors analyze performance of MEGACO (MEdia GAteway COntrol protocol) based on Diameter which is an Authentication, Authorization and Accounting (AAA) protocol developed within the Internet Engineering Task Force (IETF). Diameter is loosely based on Remote Authentication Dial In User Service (RADIUS), which has previously been used...

    Provided By Iran Telecommunication Research Center

  • White Papers // Aug 2008

    Anomaly Intrusion Detection System Using Hierarchical Gaussian Mixture Model

    Intrusion Detection Systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems. Anomaly-based approaches in Intrusion Detection Systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2008

    Malware Fuzzy Ontology for Semantic Web

    The term malware, in the area related to computer science, is used to define malicious code which is designed and written to execute attacks on software systems. In this paper, after a quick review of malact ontology, malware ontology is presented. Malwares include viruses, worms, botnets, spywares, backdoors, trojan horses,...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2008

    Optimal Resource Allocation in Next Generation Network Services Using Engineering Optimization With Linear Constraint Particle Swarm

    This paper considers the problem of pricing for optimal resource allocation service using Engineering Optimization with Particle Swarm algorithm that ensures efficient resource allocation that provides guaranteed quality of service while maximizing profit in multiservice networks. The author formulates the generalized optimization algorithm based on the notion of a "Profit...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2009

    A Combined Method for Detecting Spam Machines on a Target Network

    The HITS and PageRank algorithms and K-Means clustering algorithm are two main methods for detecting spam machines. In PageRank algorithm, it is proposed to calculate weights based on different factors. Correct selection of weights has important role in the accuracy of the algorithm. This paper proposes a good method for...

    Provided By Iran Telecommunication Research Center

  • White Papers // Oct 2009

    Delay Calculation of Internet Traffic in Mobile Systems

    An important QoS factor for wireless network planning is delay. The authors should provide enough resources (Bandwidth) for conveying the traffic load. Next generation a wireless network is going to be an all IP network. In this path, voice will be changed to packet. In this paper they introduce a...

    Provided By Iran Telecommunication Research Center

  • White Papers // Nov 2008

    Nodes' Credit Based Directed Diffusion for Wireless Sensor Networks

    For data gathering in wireless sensor networks, sensors extract useful information from environment; this information has to be routed through several intermediate nodes to reach the destination. How information can effectively disseminate to the destination is one of the most important tasks in sensor networks. Problem arises when intermediate nodes...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jan 2011

    Private Identification, Authentication and Key Agreement Protocol With Security Mode Setup

    Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper the authors consider UMTS AKA and some other proposed schemes. Then the authors explain the known...

    Provided By Iran Telecommunication Research Center

  • White Papers // Sep 2008

    Design and Implementation of a Fast VOQ Scheduler for a Switch Fabric

    The technical manufacturing, which is based on Switch Fabric and VOQ (Virtual Output Queuing), is used in speedy routers, which are used in core network. For configuring of Switch Fabric having speedy scheduler with high Throughput is required. The most promising algorithm is iSLIP which is an iterative algorithm that...

    Provided By Iran Telecommunication Research Center

  • White Papers // Oct 2008

    Scenarios for Testing Reliable Transmission of Provisional Responses in SIP User Agent

    In this paper, the authors present testing scenarios for reliable transmission of provisional responses in SIP user agent. Several test scenarios for different functionalities of SIP user agent have been presented by European Telecommunications Standards Institute (ETSI). However, no scenarios have been given for reliable transmission of provisional responses. Scenarios...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jun 2009

    A Novel Plausible Deniability Scheme in Secure Steganography

    The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of...

    Provided By Iran Telecommunication Research Center

  • White Papers // Dec 2010

    Backplane Serial Signaling and Protocol for Telecom Systems

    In this paper, the authors implement a modern serial backplane platform for telecommunication inter-rack systems. For combination high reliability and low cost protocol property, they applied High-level Data Link Control (HDLC) protocol with Low Voltage Differential Signaling (LVDS) bus for card to card communicated over backplane. HDLC protocol is a...

    Provided By Iran Telecommunication Research Center

  • White Papers // Jul 2010

    Safety Technologies Impacts Survey in M-Services Security Provision

    Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the m-services area is the security issue. Different...

    Provided By Iran Telecommunication Research Center