Results 31 to 40 of about 14,303 (202)

Towards Quantum-Safe O-RAN: Experimental Evaluation of ML-KEM-Based IPsec on the E2 Interface

open access: yesFuture Internet
As Open Radio Access Network (O-RAN) deployments expand and adversaries adopt “store-now, decrypt-later” strategies, operators need empirical data on the cost of migrating critical control interfaces to post-quantum cryptography (PQC).
Mario Perera   +5 more
doaj   +1 more source

Analysis security system performance MIPv6 in signaling process using AES and Twofish algorithms

open access: yesTeknika, 2021
Mobile technology has become a necessity for modern society in the digital era. The ease of various information processes is a driving force for the growth of mobile users.
Supriyanto Praptodiyono   +2 more
doaj   +1 more source

Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec [PDF]

open access: yes, 2011
With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN.
Duquennoy, Simon   +3 more
core   +1 more source

Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration

open access: yes, 2018
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim   +7 more
core   +1 more source

Implementing IPsec

open access: yesGLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record, 2002
The IP security protocols are sufficiently mature to benefit from multiple independent implementations and worldwide deployment. Towards that goal, we implemented the protocols for the BSD/OS, Linux, OpenBSD and NetBSD. While some differences in the implementations exist due to the differences in the underlying operating system structures, the design ...
Keromytis, Angelos D.   +2 more
openaire   +2 more sources

Integrated LEO Constellation and In‐Cabin Distribution System for Continuous Aircraft 5G Connectivity

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada   +4 more
wiley   +1 more source

Lightweight MIPv6 with IPSec Support [PDF]

open access: yesMobile Information Systems, 2014
Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals.
Jara, Antonio J.   +4 more
openaire   +1 more source

Artificial Intelligence Applications in Smart Cities: Integrating Communication, Energy Management, Cybersecurity and Internet of Things

open access: yesThe Journal of Engineering, Volume 2026, Issue 1, January/December 2026.
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik   +5 more
wiley   +1 more source

МЕТОД ІНТЕГРАЦІЇ ПОЛІТИК ІНФОРМАЦІЙНОЇ БЕЗПЕКИ, СТАНДАРТІВ ТА ПРОТОКОЛІВ У ПРОЦЕС ПОБУДОВИ КОМПЛЕКСНОЇ СИСТЕМИ ЗАХИСТУ ІНФОРМАЦІЇ В ОРГАНІЗАЦІЇ

open access: yesКібербезпека: освіта, наука, техніка
У статті розглянуто проблему розриву між задекларованими політиками інформаційної безпеки, вимогами стандартів та протоколів, а також фактичним функціонуванням інформаційної інфраструктури в організаціях.
Валерія Балацька   +2 more
doaj   +1 more source

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy