Timo Kiravuo

Learn More
Packet switched cellular networks offer significant cost and capacity utilization benefits for machine to machine (M2M) communications. However, the current cellular systems facilitate that communications must be initiated by the mobile station, as the architecture lacks needed monitoring and controlling functions. This study presents an architecture that(More)
Ethernet has become the de facto layer 2 transmission technology, partly due to ease of use and cost efficiency. The cores of most data centers around the world are based on Ethernet, and large access and core networks are built without IP routing. The inherent simplicity of Ethernet has several drawbacks, including the overhead of network-wide broadcasting(More)
Modern cyberweapons and malware are targeted bespoke software packages that bypass firewalls, virus checkers and intrusion prevention systems by appearing legitimate. Recent incidents have shown that these tools present a real threat from nation states and criminal organizations. In this paper, we present a systematic model for the structure and operations(More)
  • Timo Kiravuo
  • 2011IEEE 10th International Conference on Trust…
  • 2011
Ethernet is built on the implicit assumption that all data packets are true and all participants honest, which leaves room for security vulnerabilities. Trust and reputation based systems could be used to increase the level of security on unmanaged Ethernet. By having the switches evaluate their neighbors' actions and propagating the information a(More)
  • 1