Network Security
1. An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

M. Amiri; A. Barati

Volume 7, Issue 2 , Summer and Autumn 2019, , Pages 133-144

http://dx.doi.org/10.22061/jecei.2020.5621.241

Abstract
  Background and Objectives: Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. Methods: A honeypot is ...  Read More

Network Security
2. A New Framework for Secure Routing in VANET

S. Goli-Bidgoli; M. SofarAli

Volume 6, Issue 2 , Summer and Autumn 2018, , Pages 119-128

http://dx.doi.org/10.22061/jecei.2019.5125.193

Abstract
  Background and Objectives: Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node ...  Read More

Network Security
3. RSPAE: RFID Search Protocol based on Authenticated Encryption

M. Eslamnezhad Namin; M. Hosseinzadeh; N. Bagheri; A. Khademzadeh

Volume 6, Issue 2 , Summer and Autumn 2018, , Pages 185-198

http://dx.doi.org/10.22061/jecei.2019.5186.199

Abstract
  Background and Objectives: Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. Methods: In this article, an RFID-based search ...  Read More