Volume 5 Number 3 September 2014


Modeling Network Security using Colored Petri Nets Model

Abdelali EL BOUCHTI, Abdelkrim HAQIQ

https://doi.org/

Abstract Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community. However, the network security problem is far from completely solved. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). Researchers have been exploring the applicability of colored Petri nets... Read More


Access Point Location and Trajectory Tracking Method based on the Weight Update

Lin Chen, Yun Lan, Gang Li, Yulei Yuan

https://doi.org/

Abstract In recent years, wireless access technology is quite popular for its convenience, fast and flexible. However, due to the openness of wireless network, this technology also faces with a number of secure challenges, one of which is how to deal with the unauthorized access point effectively. As we all know, the unauthorized access point leads to not only increasing interference between... Read More


Secure Communication and Routing Architecture in Wireless Sensor Networks

Abdelali EL BOUCHTI, Abdelkrim HAQIQ

https://doi.org/

Abstract Security of wireless sensor networks (WSN) is an important feature, as they are used in critical applications such as surveillance, monitoring, tracking and controlling etc. Secure and reliable communication is highly important in delivering critical information correctly and in-time by low-powered sensor motes (SM). Many secure WSNs protocols have been proposed but they have focused primarily on denial-of-communication at the... Read More