SIBRA: Scalable internet bandwidth reservation architecture

C Basescu, RM Reischuk, P Szalachowski… - arxiv preprint arxiv …, 2015 - arxiv.org
This paper proposes a Scalable Internet Bandwidth Reservation Architecture (SIBRA) as a
new approach against DDoS attacks, which, until now, continue to be a menace on today's …

An SDN-based approach to enhance the end-to-end security: SSL/TLS case study

A Ranjbar, M Komu, P Salmela… - NOMS 2016-2016 IEEE …, 2016 - ieeexplore.ieee.org
End-to-end encryption is becoming the norm for many applications and services. While this
improves privacy of individuals and organizations, the phenomenon also raises new kinds of …

P-hip: A lightweight and privacy-aware host identity protocol for internet of things

M Hossain, R Hasan - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The host identity protocol (HIP) has emerged as the most suitable solution to uniquely
identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as …

NTMobile における移動透過性の実現と実装

内藤克浩, 上醉尾一真, 西尾拓也, 水谷智大… - 情報処理学会 …, 2013 - ipsj.ixsq.nii.ac.jp
論文抄録 **年の無線端末は複数の無線インタフェースを実装しており, ネットワークにアクセスする
際にインタフェースを切り替えて利用可能である. 移動透過技術とはアクセスネットワークが切り替え …

Towards a holistic framework for secure, privacy-aware, and trustworthy internet of things using resource-efficient cryptographic schemes

M Hossain - 2018 - search.proquest.com
The increased deployment of Internet of Things (IoT) based systems make smart devices
target for malicious attacks. These devices can also be used as tools for committing crimes …

IoT and HIP's opportunistic mode

A Fuchs, A Stulman, A Gurtov - IEEE Transactions on Mobile …, 2020 - ieeexplore.ieee.org
Key sharing has always been a complex issue. It became even more challenging for the
Internet of Things (IoT), where a trusted third party for global management rarely exists. With …

Realization of mobile femtocells: operational and protocol requirements

S Namal, M Liyanage, A Gurtov - Wireless personal communications, 2013 - Springer
Femtocells are commissioned in wide range of commercial systems, such as CDMA, GSM,
LTE, Wi-Fi, and WiMAX, and offer economically viable solutions to improve network …

Secure and multihomed vehicular femtocells

S Namal, J Pellikka, A Gurtov - 2012 IEEE 75th Vehicular …, 2012 - ieeexplore.ieee.org
Operators must ensure seamless voice and data session continuity even when subscribers
are on move. Service continuity is one of the most critical quality parameter in a cellular …

Lightweight host and user authentication protocol for All-IP telecom networks

J Pellikka, A Gurtov, Z Faigl - … on a World of Wireless, Mobile …, 2012 - ieeexplore.ieee.org
Future wireless networks are moving fast towards all-IP network architectures and mobile
operators are expanding their services outside traditional cellular networks becoming multi …

[PDF][PDF] Modeling the signaling overhead in host identity protocol-based secure mobile architectures

Z Faigl, M Telek - Journal of Industrial and Management …, 2014 - webspn.hit.bme.hu
One of the key issues in recent mobile telecommunication is to increase the scalability of
current packet data networks. This comes along with the requirement of reducing the load of …