Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Potential Fraudulent Usage in Mobile Telecommunications Networks
IEEE Transactions on Mobile Computing
Hermes: A Distributed Event-Based Middleware Architecture
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Secure Mobile IP using IP Security Primitives
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Lightweight Security Mechanisms for Wireless Video Transmission
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
A New Authentication Protocol for Roaming Users in GSM Networks
ISCC '99 Proceedings of the The Fourth IEEE Symposium on Computers and Communications
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
Role-based access control for publish/subscribe middleware architectures
Proceedings of the 2nd international workshop on Distributed event-based systems
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Network coding for efficient communication in extreme networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
Preventing Spam in Publish/Subscribe
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
Online supervised spam filter evaluation
ACM Transactions on Information Systems (TOIS)
Towards Quantifying the (In)Security of Networked Systems
AINA '07 Proceedings of the 21st International Conference on Advanced Networking and Applications
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Worms vs. perimeters: the case for hard-LANs
HOTI '04 Proceedings of the High Performance Interconnects, 2004. on Proceedings. 12th Annual IEEE Symposium
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Proceedings of the 2007 inaugural international conference on Distributed event-based systems
QUIP: a protocol for securing content in peer-to-peer publish/subscribe overlay networks
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Anti-Phishing by Smart Mobile Device
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
A Flexible Approach to Measuring Network Security Using Attack Graphs
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
M-commerce Security Solution Based on the 3rd Generation Mobile Communication
ISCSCT '08 Proceedings of the 2008 International Symposium on Computer Science and Computational Technology - Volume 02
Cognitive Spectrum and Its Security Issues
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Solutions to the GSM Security Weaknesses
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Testing the Symbian OS Platform Security Architecture
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Similarity Search over DNS Query Streams for Email Worm Detection
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
LIPSIN: line speed publish/subscribe inter-networking
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
On the Benefits of Early Filtering of Botnet Unwanted Traffic
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Network virtualization: state of the art and research challenges
IEEE Communications Magazine
IEEE Spectrum
Why Measuring Security Is Hard
IEEE Security and Privacy
Roles and security in a publish/subscribe network architecture
ISCC '10 Proceedings of the The IEEE symposium on Computers and Communications
Retransmission steganography and its detection
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special issue on Digital Information Forensics
A Network Coding Approach to Secret Key Distribution
IEEE Transactions on Information Forensics and Security
An efficient identity-based cryptosystem for end-to-end mobile security
IEEE Transactions on Wireless Communications
Broadcast channels with confidential messages
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
A Random Linear Network Coding Approach to Multicast
IEEE Transactions on Information Theory
Applications of LDPC Codes to the Wiretap Channel
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Anonymous Networking Amidst Eavesdroppers
IEEE Transactions on Information Theory
Secret key agreement by public discussion from common information
IEEE Transactions on Information Theory
Secure communication mechanisms for GSM networks
IEEE Transactions on Consumer Electronics
Taking the next step beyond spectrum auctions: open spectrum access
IEEE Communications Magazine
Mobile software agents: an overview
IEEE Communications Magazine
Full length article: On coding for reliable communication over packet networks
Physical Communication
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service attacks were treated as apocalypse for networking. Now, they are considered moderate damage, whereas more sophisticated and inconspicuous attacks, such as botnets activities, might have greater and far reaching impact. As the Internet is expanding to mobile phones and ‘smart dust’ and as its social coverage is liberalized towards the realization of ubiquitous computing (with communication), the concerns on security and privacy have become deeper and the problems more challenging than ever. Re-designing the Internet as the Network of the Future is self-motivating for researchers, and security and privacy cannot be provided again as separate, external, add-on, solutions. In this paper, we discuss the security and privacy challenges of the Network of the Future and try to delimit the solutions space on the basis of emerging techniques. We also review methods that help the quantification of security and privacy in an effort to provide a more systematic and quantitative treatment of the area in the future. Copyright © 2011 John Wiley & Sons, Ltd.