Results 31 to 40 of about 14,618 (242)

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

open access: yesSensors, 2021
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

open access: yesSensors, 2022
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources
Taief Alaa Al-Amiedy   +5 more
doaj   +1 more source

Impact of IPv4-IPv6 Coexistence in Cloud Virtualization Environment [PDF]

open access: yesAnnals of telecommunications-annales des t\'el\'ecommunications 69.9-10 (2014): 485-496, 2016
Since January 2011, IPv4 address space has exhausted and IPv6 is taking up the place as successor. Coexistence of IPv4 and IPv6 bears problem of incompatibility, as IPv6 and IPv4 headers are different from each other, thus, cannot interoperate with each other directly.
arxiv   +1 more source

Context Aware Handover Algorithms For Mobile Positioning Systems

open access: yesComputer Science, 2014
: This work proposes context aware handover algorithms for mobile positioning systems. The algorithms perform handover among positioning systems based on important contextual factors related to position determination with efficient use of battery.
Sazid Z. Khan   +4 more
doaj   +1 more source

Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP)

open access: yesIEEE Access, 2021
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it vulnerable to many types of attacks, such as Router Advertisement (RA ...
Abdullah Ahmed Bahashwan   +4 more
doaj   +1 more source

IPv6 Migration, OSPFv3 Routing based on IPv6, and IPv4/IPv6 Dual-Stack Networks and IPv6 Network: Modeling, and Simulation [PDF]

open access: yesThe KIPS Transactions:PartC, 2011
The objective of this paper is to analyze and characterize to simulate routing observations on end-to-end routing circuits and a ping experiment of a virtual network after modeling, such as IPv6 migration, an OSPFv3 routing experiment based on an IPv6 environment, and a ping experiment for IPv4/IPv6 dual-stack networks and IPv6 network for OSPFv3 ...
openaire   +2 more sources

On Implementing IPTV Platform with IPv4 and IPv6 Devices

open access: yesJournal of Telecommunications and Information Technology, 2023
The end of IPv4 addresses is now a reality. Providers not updated to IPv6 will have to hurry up the IPv6 start in its own network. Introduction of IPv6 means not only change of main routers but also change of mentality in operators, applications ...
Jordi Mongay Batalla, Piotr Krawiec
doaj   +1 more source

Current State of IPv6 Security in IoT [PDF]

open access: yesarXiv, 2021
This report presents the current state of security in IPv6 for IoT devices. In this research conducted from May 2020 to July 2020, we explored the global growth of IPv6 and compared it with the real growth of IPv6 in a medium size network. If IPv6 is already being used, are attackers already attacking using this protocol?
arxiv  

How Ready Is DNS for an IPv6-Only World? [PDF]

open access: yesProceedings of the Passive and Active Measurement Conference 2023 (PAM '23), 2023
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAAA resource record for a zone's nameserver does not necessarily imply that it is resolvable in an IPv6-only ...
arxiv  

Home - About - Disclaimer - Privacy