Results 71 to 80 of about 14,303 (202)
Conformance test suite for implementations of the security protocol suite IPsec v2
The paper presents conformance test suite for new Internet Protocol Security Suite IPsec v2. The test suite was constructed by means of the UniTESK automated testing technology and its implementation, CTESK toolkit.The work was done in the Institute for ...
A. V. Nikeshin +2 more
doaj
An Extensive Classification of 5G Network Jamming Attacks
The paper introduces a pioneering taxonomy for 5G jamming attacks, meticulously crafted through diverse research methodologies, including literature review, case studies, incident database analysis, and network architecture assessment. This taxonomy is based on six dimensions: attack classification, attack techniques, jammer characteristics, impact and
Shreya Savadatti +4 more
wiley +1 more source
Telesurgery and robotic surgery are two real‐time mission‐critical applications where Artificial Intelligence (AI) has a lot of perspective. In this work, a blockchain‐ and AI‐powered telesurgery system for 6 G communication is suggested, which describes a transparent, safe, self‐managing, and trustworthy structure having massive Ultra‐Reliable Low ...
Punitha S., Preetha K. S., Shonak Bansal
wiley +1 more source
Penelitian ini membahas beberapa protokol VPN (Virtual Private Network), yaitu PPTP, SSTP, L2TP, dan IPsec, serta analisis metode autentikasi yang digunakan pada masing – masing protokol.
Annisa Dwi Prameswari +1 more
doaj +1 more source
An Overview of Recent Wireless Technologies for IoT‐Enabled Smart Grids
Smart Grid is a way of providing bidirectional energy flow with the integration of latest communication technologies and advanced control methods to overcome the issues associated with the current power grid such as unidirectional power flow, resource wastage, reliability, security, enhanced quality, and increasing demand of energy.
Rashiqa Abdul Salam +6 more
wiley +1 more source
An Overview of Secure Communications for the Internet of Things [PDF]
As an emerging technology that combines both digital and physical realms, access to information technology has expanded (IoT) the Internet of Things. The Internet of Things, as it becomes more pervasive, will overshadow human life as much as possible ...
Seyed Ali Zoljalali Moghaddam +1 more
doaj
A new approach to header compression in secure communications
The paper presents a new header compression mechanism for the IPv6 protocol. Its main benefit is the re- duction of the overhead caused by IPSec tunnel mode which enlarges datagrams in order to provide security services such as authentication and ...
Christoph Karg, Martin Lies
doaj +1 more source
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud [PDF]
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud users to run their own virtual machines (VMs) on available cloud computing resources.
Aslam, Mudassar +3 more
core +1 more source
Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid +5 more
core
Description and Experience of the Clinical Testbeds [PDF]
This deliverable describes the up-to-date technical environment at three clinical testbed demonstrator sites of the 6WINIT Project, including the adapted clinical applications, project components and network transition technologies in use at these ...
Kalra, D., Lawrentowski, A.
core

