Telecom Reporting Solution

Displaying 1-22 of 22 results

  • White Papers // Jan 2014

    Preventing Coordinated Attacks via Alert Correlation

    When attackers gain access to enterprise or corporate networks by compromising authorized users, computers, or applications, the network and its resources can be used to perform distributed and coordinated attacks against third party networks or even on computers on the network itself. The authors are working on a decentralized scheme...

    Provided By Telecom Reporting Solution

  • White Papers // Jan 2014

    Secure Agent-Based Management for Pervasive Environments

    A typical pervasive computing scenario may consists of a wide range of devices interconnected through ad-hoc networks. One of the problems that pervasive computing introduces is the management and interaction between these devices, as well as the security implications of this management. In this paper, the authors present an architecture,...

    Provided By Telecom Reporting Solution

  • White Papers // Oct 2013

    A Nash Stackelberg Game for Revenue Maximization and Vertical Handover Decision Making

    Radio resource and mobility managements are becoming more and more complex within now-a-days rich and heterogeneous wireless access networking systems. Multiple requirements, challenges and constraints, at both technical and economical perspectives have to be considered. While the main objective remains guaranteeing the best Quality of Service (QoS) and optimal radio...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2013

    Mathematical Programming and Heuristic Approaches for Virtual Network Mapping and Cloud Networking

    In this paper, the authors address dynamic networking of distributed infrastructure resources for cloud and network federations. It is assumed that network virtualization and virtual network concepts are used in addition to traditional networking to provide the dedicated connectivity service. Tenants or end users request the service in the form...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2013

    Energy Efficient VM Scheduling for Cloud Data Centers: Exact Allocation and Migration Algorithms

    In this paper, the authors present two exact algorithms for energy efficient scheduling of Virtual Machines (VMs) in cloud data centers. Modeling of energy aware allocation and consolidation to minimize overall energy consumption leads them to the combination of an optimal allocation algorithm with a consolidation algorithm relying on migration...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2013

    Real-time Malicious Fast-flux Detection Using DNS and Bot Related Features

    In the context of the botnets, fast-flux refers to the strategy of hiding the C&C (Command and Control) servers. Such servers are crucial for the life cycle of the botnet. The idea is to place the servers behind proxy nodes using the DNS (Domain Name System) protocol to map the...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2012

    A Lattice Based Authentication for Low-Cost RFID

    Security and privacy are major threats for the RFID technology today. In this paper, the authors present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2012

    Context-Aware Routing Method for P2P File Sharing Systems Over MANET

    Mobile devices have achieved great progress. They allow user to store more audio, video, text and image data. These devices are also equipped with low radio range technology, like Bluetooth and Wi-Fi, etc. By means of the low radio range technology, they can communicate with each other without using communication...

    Provided By Telecom Reporting Solution

  • White Papers // Jun 2012

    E2E: An Optimized IPsec Architecture for Secure and Fast Offload

    When mobile End Users are offloaded from a Radio Access Network (RAN) to a WLAN, current I-WLAN offloaded architectures consider traffic converging to a common security gateway. In this paper, the authors propose an alternative End-To-End security (E2E) architecture based on the MOBIKEX protocol, which extends the MOBIKE Mobility and...

    Provided By Telecom Reporting Solution

  • White Papers // Mar 2012

    Application-Aware Cost Function and Its Performance Evaluation Over Scalable Video Conferencing Services on Heterogeneous Networks

    Video conferencing service requires a multicast tree to distribute its multimedia contents to all participants. Link cost is very important in building such media distribution trees. In this paper, a multi-variable cost function is proposed. This cost function can calculate links' costs based on both network resources and application's requirements....

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2011

    Using SEND Signature Algorithm Agility and Multiple-Key CGA to Secure Proxy Neighbor Discovery and Anycast Addressing

    The Neighbor Discovery Protocol (NDP) is a fundamental component of the IPv6 protocol suite in charge of the Link-layer interactions (Address Resolution, Router Discovery, etc.). Over the years, it has been extended to new usages, such as mobility (Mobile IPv6), proxy advertisements (neighbor discovery proxies) and security (SEcure Neighbor Discovery,...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2008

    Generating Attack Scenarios for the Validation of Security Protocol Implementations

    In this paper, the authors consider the validation of security protocols, whose aim is to ensure some security properties when the communication medium is not reliable. The goal is to uncover protocol vulnerabilities that an attacker can exploit and cause security failures. Their approach uses a fault injector to inject...

    Provided By Telecom Reporting Solution

  • White Papers // May 2008

    Light and Distributed AAA Scheme for Mobile Ad-Hoc Networks

    Ad-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. The authors' work focuses on a light and distributed AAA infrastructure that supports authentication and authorization. They make use of a distributed protocol based on...

    Provided By Telecom Reporting Solution

  • White Papers // Oct 2007

    WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad Hoc Networks

    Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for different applications. The authors propose a novel hierarchical distributed AAA (Authentication, Authorization, and Accounting) architecture for proactive link state routing protocols notably OLSR. This...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2007

    SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks

    To increase the lifespan of Wireless Sensor Networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from...

    Provided By Telecom Reporting Solution

  • White Papers // May 2007

    Defending Against Nodes Replication Attacks on Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is subject to several kinds of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2007

    A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks with No Requirements for Trusted Aggregator Nodes

    Data aggregation is an important feature in Wireless Sensor Networks (WSN), where data inputs at an aggregator node are merged to produce compact small output data, thus reducing the network's transmission overhead and preserving the scarce-battery resources of sensors. Unfortunately, if not secured against attackers, data aggregation can produce erroneous...

    Provided By Telecom Reporting Solution

  • White Papers // Mar 2007

    A New Resilient Key Management Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2006

    AAA Considerations Within Several NEMO Deployment Scenarios

    Network mobility allows nodes to maintain their connections whilst attaching to different access networks. These access networks may be based on different access technologies. The NEMO Basic Support protocol is a generic protocol that can be used in different mobile environments such as bus or train. Yet, access control mechanisms...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    Inter-Domain Security for Mobile IPv6

    Mobile IPv6 is a macro-mobility \"Universal\" solution and is only adapted to the mobile's movements within its own administrative domain. As mobile IPv6 is expected to be the basis for the third generation cellular phone networks, a solution for inter-domain security is required. What is needed is that the visited...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    Selecting an ATM or IP Security Solution to Secure an IP Over ATM Virtual Private Network

    In 1999, the ATM forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP)...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    For a Secure Mobile IP and Mobile IPv6 Deployment

    In this paper, the authors address the security problems raised by the introduction of Mobile IP and Mobile IPv6 protocols into existing networks. First, a protocol-based analysis highlights several malicious attacks like masquerade, and denial of service. Then classical network architecture is studied for the best placements of mobility entities...

    Provided By Telecom Reporting Solution

  • White Papers // Mar 2012

    Application-Aware Cost Function and Its Performance Evaluation Over Scalable Video Conferencing Services on Heterogeneous Networks

    Video conferencing service requires a multicast tree to distribute its multimedia contents to all participants. Link cost is very important in building such media distribution trees. In this paper, a multi-variable cost function is proposed. This cost function can calculate links' costs based on both network resources and application's requirements....

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2012

    A Lattice Based Authentication for Low-Cost RFID

    Security and privacy are major threats for the RFID technology today. In this paper, the authors present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical challenge/response RFID mutual authentication protocol for low-cost RFID systems based on this NTRU's adaptation. Thanks to properties of the...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2012

    Context-Aware Routing Method for P2P File Sharing Systems Over MANET

    Mobile devices have achieved great progress. They allow user to store more audio, video, text and image data. These devices are also equipped with low radio range technology, like Bluetooth and Wi-Fi, etc. By means of the low radio range technology, they can communicate with each other without using communication...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2013

    Real-time Malicious Fast-flux Detection Using DNS and Bot Related Features

    In the context of the botnets, fast-flux refers to the strategy of hiding the C&C (Command and Control) servers. Such servers are crucial for the life cycle of the botnet. The idea is to place the servers behind proxy nodes using the DNS (Domain Name System) protocol to map the...

    Provided By Telecom Reporting Solution

  • White Papers // May 2007

    Defending Against Nodes Replication Attacks on Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is subject to several kinds of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go...

    Provided By Telecom Reporting Solution

  • White Papers // Mar 2007

    A New Resilient Key Management Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most...

    Provided By Telecom Reporting Solution

  • White Papers // Jan 2014

    Preventing Coordinated Attacks via Alert Correlation

    When attackers gain access to enterprise or corporate networks by compromising authorized users, computers, or applications, the network and its resources can be used to perform distributed and coordinated attacks against third party networks or even on computers on the network itself. The authors are working on a decentralized scheme...

    Provided By Telecom Reporting Solution

  • White Papers // Jan 2014

    Secure Agent-Based Management for Pervasive Environments

    A typical pervasive computing scenario may consists of a wide range of devices interconnected through ad-hoc networks. One of the problems that pervasive computing introduces is the management and interaction between these devices, as well as the security implications of this management. In this paper, the authors present an architecture,...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2007

    A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks with No Requirements for Trusted Aggregator Nodes

    Data aggregation is an important feature in Wireless Sensor Networks (WSN), where data inputs at an aggregator node are merged to produce compact small output data, thus reducing the network's transmission overhead and preserving the scarce-battery resources of sensors. Unfortunately, if not secured against attackers, data aggregation can produce erroneous...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    Inter-Domain Security for Mobile IPv6

    Mobile IPv6 is a macro-mobility \"Universal\" solution and is only adapted to the mobile's movements within its own administrative domain. As mobile IPv6 is expected to be the basis for the third generation cellular phone networks, a solution for inter-domain security is required. What is needed is that the visited...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2006

    AAA Considerations Within Several NEMO Deployment Scenarios

    Network mobility allows nodes to maintain their connections whilst attaching to different access networks. These access networks may be based on different access technologies. The NEMO Basic Support protocol is a generic protocol that can be used in different mobile environments such as bus or train. Yet, access control mechanisms...

    Provided By Telecom Reporting Solution

  • White Papers // May 2008

    Light and Distributed AAA Scheme for Mobile Ad-Hoc Networks

    Ad-hoc networks are subject to malicious attacks given their wireless nature and high dynamicity. Various security issues have been raised so far, especially access control. The authors' work focuses on a light and distributed AAA infrastructure that supports authentication and authorization. They make use of a distributed protocol based on...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2011

    Using SEND Signature Algorithm Agility and Multiple-Key CGA to Secure Proxy Neighbor Discovery and Anycast Addressing

    The Neighbor Discovery Protocol (NDP) is a fundamental component of the IPv6 protocol suite in charge of the Link-layer interactions (Address Resolution, Router Discovery, etc.). Over the years, it has been extended to new usages, such as mobility (Mobile IPv6), proxy advertisements (neighbor discovery proxies) and security (SEcure Neighbor Discovery,...

    Provided By Telecom Reporting Solution

  • White Papers // Oct 2007

    WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad Hoc Networks

    Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for different applications. The authors propose a novel hierarchical distributed AAA (Authentication, Authorization, and Accounting) architecture for proactive link state routing protocols notably OLSR. This...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2008

    Generating Attack Scenarios for the Validation of Security Protocol Implementations

    In this paper, the authors consider the validation of security protocols, whose aim is to ensure some security properties when the communication medium is not reliable. The goal is to uncover protocol vulnerabilities that an attacker can exploit and cause security failures. Their approach uses a fault injector to inject...

    Provided By Telecom Reporting Solution

  • White Papers // Jun 2012

    E2E: An Optimized IPsec Architecture for Secure and Fast Offload

    When mobile End Users are offloaded from a Radio Access Network (RAN) to a WLAN, current I-WLAN offloaded architectures consider traffic converging to a common security gateway. In this paper, the authors propose an alternative End-To-End security (E2E) architecture based on the MOBIKEX protocol, which extends the MOBIKE Mobility and...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    Selecting an ATM or IP Security Solution to Secure an IP Over ATM Virtual Private Network

    In 1999, the ATM forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP)...

    Provided By Telecom Reporting Solution

  • White Papers // Apr 2006

    For a Secure Mobile IP and Mobile IPv6 Deployment

    In this paper, the authors address the security problems raised by the introduction of Mobile IP and Mobile IPv6 protocols into existing networks. First, a protocol-based analysis highlights several malicious attacks like masquerade, and denial of service. Then classical network architecture is studied for the best placements of mobility entities...

    Provided By Telecom Reporting Solution

  • White Papers // Sep 2007

    SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless Sensor Networks

    To increase the lifespan of Wireless Sensor Networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2013

    Mathematical Programming and Heuristic Approaches for Virtual Network Mapping and Cloud Networking

    In this paper, the authors address dynamic networking of distributed infrastructure resources for cloud and network federations. It is assumed that network virtualization and virtual network concepts are used in addition to traditional networking to provide the dedicated connectivity service. Tenants or end users request the service in the form...

    Provided By Telecom Reporting Solution

  • White Papers // Jul 2013

    Energy Efficient VM Scheduling for Cloud Data Centers: Exact Allocation and Migration Algorithms

    In this paper, the authors present two exact algorithms for energy efficient scheduling of Virtual Machines (VMs) in cloud data centers. Modeling of energy aware allocation and consolidation to minimize overall energy consumption leads them to the combination of an optimal allocation algorithm with a consolidation algorithm relying on migration...

    Provided By Telecom Reporting Solution

  • White Papers // Oct 2013

    A Nash Stackelberg Game for Revenue Maximization and Vertical Handover Decision Making

    Radio resource and mobility managements are becoming more and more complex within now-a-days rich and heterogeneous wireless access networking systems. Multiple requirements, challenges and constraints, at both technical and economical perspectives have to be considered. While the main objective remains guaranteeing the best Quality of Service (QoS) and optimal radio...

    Provided By Telecom Reporting Solution