- Full text PDF available (15)
Wireless sensor networks usually require certain level of security, however there is lack of sensor nodes with cryptographic hardware build-in. We proved realization of cryptographic platform based on smart card--sensor node connection. Time complexity and power consumption of the platform was measured and compared to conventional software implementation.… (More)
In this work wepsilare dealing with security in highly distributed systems, namely in peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of Malware spreading. Also… (More)
This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper… (More)
The paper deals with the examples of the simulation techniques using the Linda programming language. The Linda programming language (or system) works in a distributed environment. The distributed environment is thought of as a set of processors which run in parallel and which do not share a common memory. The processors communicate only via communication… (More)
In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are describing our system for automatic file downloading.
Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This… (More)
The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless network. The paper is focused on the problem of communication in the Bluetooth wireless network, but the model should be general enough to support also other kinds of wireless short-range networks, e.g. networks with infrared communication,… (More)