Learn More
Packet switched cellular networks offer significant cost and capacity utilization benefits for machine to machine (M2M) communications. However, the current cellular systems facilitate that communications must be initiated by the mobile station, as the architecture lacks needed monitoring and controlling functions. This study presents an architecture that(More)
Modern cyberweapons and malware are targeted bespoke software packages that bypass firewalls, virus checkers and intrusion prevention systems by appearing legitimate. Recent incidents have shown that these tools present a real threat from nation states and criminal organizations. In this paper, we present a systematic model for the structure and operations(More)
Ethernet is built on the implicit assumption that all data packets are true and all participants honest, which leaves room for security vulnerabilities. Trust and reputation based systems could be used to increase the level of security on unmanaged Ethernet. By having the switches evaluate their neighbors' actions and propagating the information a(More)
  • 1