Abstract: Secure Auto-Configuration Protocols in Mobile Ad Hoc

Slides:



Advertisements
Presentaciones similares
Preguntas Esenciales 1.What are essential questions? What are their purpose in learning? 2.Look over the essential questions and think about how they might.
Advertisements

Alberto Morelli, Committed with Corn Alberto Morelli, Comprometido con el Maíz Vicepresidente 2º MAIZAR Vicepresidente 2º MAIZALL.
 Cap. 6B La Cultura. La arpillera – is a popular textile folk art of rough patchwork appliqués created by women in Chile. La arpillera is done in brilliant.
Department of Modern Languages Gramática nueva tengo tienes tiene tenemos tenéis tienen The verb tener means to have or to possess. It is an irregular.
Federación de servicios a la ciudadanía medios de comunicación, artes, cultura y deportes The impact of noise on musicians Looking for solutions.
Competitividad de Chile José Joaquín Brunner Agosto 2005 SESIÓN II.
Science Career Research Project By Jose pineda. Name of Job: Electrical Engineering I like that I would like to invent new electric and new social networks.
Miguel Cabrera. Biography Se llama Miguel Cabrera. El es de Maracay, Venezuela. Miguel was a baseball player his whole life, but in 1999 he was drafted.
El calentamiento - el 6 de octubre 1.el bolígrafo la bolígrafo 2.la carpetaslas carpetas 3.el deporteslos deportes 4.el plumala pluma 5.las animaleslos.
OBSTACLES OF THE COMMUNICATION PROCESS SEPTEMBER 2011.
Traveling Around Spain. Toledo Toledo is the former capital of Spain. It is about one hour south of Madrid Toledo es la antigua capital de España. Esto.
El proceso Administrativo Área Académica: Licenciatura en Contaduría Profesor(a): Luis Miguel Spínola Elías Periodo: Agosto-Diciembre
Área Académica: GEOGRAFIA Tema: SATELITES ARTIFICIALES Profesor: ING. EDUARDO GARCIA FLORES Periodo: ENERO-JUNIO 2015.
Hypothyroidism Alma Cruz Simancas UNIVERSIDAD AUTÓNOMA BENITO JUÁREZ DE OAXACA FACULTAD DE MEDICINA Y CIRUGÍAFACULTAD DE MEDICINA Y CIRUGÍA «INGLES MÉDICO»«INGLES.
Understanding Documents from Mexico—Part 1 Naming Conventions, Birth Certificates, and Immunization Records Sonja Williams Migrant Education Program NCDPI.
Theories about Cognitive Learning: Jean Piaget and Jerome Bruner Ana Cañadas Alejandra Morales.
INSTITUTIONAL MISSION
El género y número de los adjetivos GRAMÁTICA 1B- p. 55.
Cómo asignar IP Address estáticos en un host
La capital de españa es MADRID Credit to: imsakolese.blogspot.com.
header Oscar Fernando Jerez Rey
To be, or not to be? Let’s start out with one of the most important verbs in Spanish: ser, which means “to be.”
ESPAñol What do you know about Spanish?
Tema: SATELITES ARTIFICIALES
#27- Por and Para.
ESPAÑA EN Laura Flores Dirección TIC
Family Culture- Graphic representation
EspaÑol 1 Lesson 3 30 de Agosto de 2016
Irregular Preterite Verbs: Ir, Ser
Tecnología aplicada al costeo
First Grade Dual High Frequency Words
Unlike English, Spanish has two words that mean for: por and para
Subject Pronouns and Ser
GRAPHIC MATERIALS 1. GRAPHIC MATERIALS. GRAPHIC MATERIALS 1. GRAPHIC MATERIALS.
Expressions with tener
Los pronombres relativos que y quien
International Conference on Computer and Applications (CCA 2012), Proceedings Abstract: E-D2HCP: Enhanced Distributed Dynamic Host Configuration Protocol.
Facultad de Ciencias Pecuarias INGENIERÍA EN ALIMENTOS THEME: Does safety information influence consumers’ preferences for controversial food products?
By the end of the lesson you’ll be able to:  Identify key places in town  Give a description of the places  Provide an opinion on their town  Compare.
Recetas 6 Objetivo: Hablar sobre la comida y las recetas
SISTEMAS METEOROLOGICOS MARIA JORDAN FISICA. Parents have the right to know that their child will be safe at school, both physically and emotionally.
WHAT IS THE BLOCKCHAIN? The Blockchain is a distributed ledger, or a decentralized data base in which digital transactions are recorded. This data base,
Cuentos Érase una vez escribir un texto para narrar una histora
LOS VERBOS TENER Y VENIR
Present Tense of -ar Verbs
Los números.
Writing about ecology Área Académica: Ingeniería Mecánica
Recetas 3 Objetivo: Hacer preguntas Hablar sobre la comida
Unlike English, Spanish has two words that mean for: por and para
Los pronombres relativos que y quien
Definite Articles.
Hoy vamos a .. aprender más información sobre sobre un lugar en España
Irregular Preterite Verbs: Ir, Ser
Recetas 5 Objetivo: Hablar sobre la comida y las recetas
Verbos Irregulares en el Pretérito: Ir, Ser
RIGHT TO PRiVACY inés boria núñez.
Proyecto: Mi horario Nombre Hora Fecha.
UNIVERSIDAD TECNICA DE MACHALA UNIDAD ACADEMICA DE CIENCIAS EMPRESARIALES CARRERA DE ECONOMIA ESTUDENTS: FIRST CONDITIONAL SENTENCES TEACHER: - Calvache.
PE # 2 Draw a picture for each verb in the box
Recetas 6 Objetivo: Hablar sobre la comida y las recetas
Replace each name(s) with the appropriate subject pronoun in Spanish 1) Julian y Paco 2) Caty y yo 3) Luisa 4) Bernardo 5) Veronica y tú.
Ultrasound. Invented by: The ultrasound was invented by Dr. Ian Donald in 1958, Donald was born in Scotland in 1910, was the pioneer in the use of diagnostic.
Unlike English, Spanish has two words that mean for: por and para
CONSEQUENCES OF ACCIDENTS AT WORK GLORIANA RUIZ. CONSEQUENCE OF WORKING WITHOUT GLOVES 1. A person can have side effects if he sprays a plant with chemicals.
Unlike English, Spanish has two words that mean for: por and para
Unlike English, Spanish has two words that mean for: por and para
Replace each name(s) with the appropriate subject pronoun in Spanish 1) Julian y Paco 2) Caty y yo 3) Luisa 4) Bernardo 5) Veronica y tú.
The causative is a common structure in English. It is used when one thing or person causes another thing or person to do something.
Subject Pronouns and Verb Ser
Draw the diagram and label. Dibuje el diagrama y la etiqueta.
Transcripción de la presentación:

Abstract: Secure Auto-Configuration Protocols in Mobile Ad Hoc Advanced Signal Processing (ASP 2012), Conference Proceedings Abstract: Secure Auto-Configuration Protocols in Mobile Ad Hoc Networks Ana Lucila Sandoval Orozco1, Julián García Matesanz2, Luis Javier García Villalba1,*, José Duván Márquez Díaz3 and Tai-hoon Kim 5 1 Grupo de Análisis, Seguridad y Sistemas (GASS) Departamento de Ingeniería del Software e Inteligencia Artificial (DISIA) Facultad de Informática, Despacho 431, Universidad Complutense de Madrid (UCM) Calle Profesor José García Santesmases s/n, Ciudad Universitaria, 28040 Madrid, Spain E-mail: {asandoval, javiergv}@fdi.ucm.es 2 Grupo de Análisis, Seguridad y Sistemas (GASS) Sección Departamental de Sistemas Informáticos y Computación - Lenguajes y Sistemas Informáticos y Ciencias de la Computación e Inteligencia Artificial - Facultad de Ciencias Matemáticas, Despacho 310-F, Universidad Complutense de Madrid (UCM) Plaza de Ciencias, 3, Ciudad Universitaria, 28040 Madrid, Spain E-mail: julian@sip.ucm.es 3 Grupo de Redes de Computadores e Ingeniería de Software (GRECIS) Departamento de Ingeniería de Sistemas, Universidad del Norte Km. 5 Autopista a Puerto Colombia, Barranquilla, Colombia E-mail: jmarquez@uninorte.edu.co 5 Department of Information Technology, Global Vision School Australia (GVSA) 20 Virgina Court, Sandy Bay, Tasmania, Australia E-mail: taihoonn@gvsa.asia Abstract Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing problems and auto-configuration. However, there is little progress in solving the secure auto-configuration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise. Acknowledgement This work was supported by the Ministerio de Industria, Turismo y Comercio (MITyC, Spain) through the Projects Avanza Competitividad I+D+I TSI-020100-2011-165 and TSI-020100-2010-482 and the Ministerio de Ciencia e Innovación (MICINN, Spain) through the Project TEC2010-18894/TCM. This work was also supported by the Departamento Administrativo de Ciencia, Tecnología e Innovación (COLCIENCIAS, Colombia) through Programa de Recuperación Contingente which funds the Project 121545221101. This work was also supported by the Security Engineering Research Center, granted by the Ministry of Knowledge Economy (MKE, Korea). 111