Results 21 to 30 of about 14,618 (242)

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

open access: yesSensors, 2022
Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

A Comprehensive Study of Accelerating IPv6 Deployment [PDF]

open access: yes, 2022
Since the lack of IPv6 network development, China is currently accelerating IPv6 deployment. In this scenario, traffic and network structure show a huge shift. However, due to the long-term prosperity, we are ignorant of the problems behind such outbreak of traffic and performance improvement events in accelerating deployment.
arxiv   +1 more source

Authentication and Privacy Approach for DHCPv6

open access: yesIEEE Access, 2019
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani   +4 more
doaj   +1 more source

IPv6 Security

open access: yesJournal of Physics: Conference Series, 2017
22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, San Francisco, United States, 10 Oct 2016 - 14 Oct 2016; Journal of physics / Conference Series 898(10), 102008 - (2017).
Babik, M.   +19 more
openaire   +3 more sources

WLCG and IPv6 – the HEPiX IPv6 working group

open access: yesJournal of Physics: Conference Series, 2014
The HEPiX (http://www.hepix.org) IPv6 Working Group has been investigating the many issues which feed into the decision on the timetable for the use of IPv6 (http://www.ietf.org/rfc/rfc2460.txt) networking protocols in High Energy Physics (HEP) Computing, in particular in the Worldwide Large Hadron Collider (LHC) Computing Grid (WLCG).
Campana, S.   +28 more
openaire   +2 more sources

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

open access: yesIEEE Access, 2021
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous growth, with more operators connecting to these IXPs even though these IXPs faced ...
Abdijalil Abdullahi   +2 more
doaj   +1 more source

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms

open access: yesIEEE Access, 2021
The distributed denial of service (DDoS) attack is one of the most destructive organized cyber-attacks against online services or computers on the network.
Ayman Ghaben   +3 more
doaj   +1 more source

An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks

open access: yesCybernetics and Information Technologies, 2021
IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation.
Abualhaj Mosleh M.   +3 more
doaj   +1 more source

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2021
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy