Abstract
In this paper an overview of the security components developed by the INDECT project is presented. This paper is focused on creating a multilevel security architecture, and describes the five basics areas for which new algorithms, components and tools are been created. In particular Virtual Private Networks, Symmetric Cryptography Block Ciphers, Quantum Cryptography, Federated ID Management and Secure Ad hoc Multipath Routing are described in detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
INDECT project web site, http://www.indect-project.eu
INDECT Consortium. D8.2: Evaluation of Components (June 2010), http://www.indect-project.eu/files/deliverables/public/deliverable-8.2
Bennett, C.H., Brassard, G.: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179 (1984)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (July 2003)
Djenouri, D., Khelladi, L., Badache, A.N.: A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks. IEEE Communications Surveys & Tutorials 7(4), 2–28 (2005)
Marina, M.K., Das, S.R.: 2002, On-demand Multipath Distance Vector Routing in Ad hoc Networks. In: Proceedings of IEEE International Conference on Network Protocols (ICNP), pp. 14–23 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stoianov, N., Urueña, M., Niemiec, M., Machník, P., Maestro, G. (2011). Overview of the Security Components of INDECT Project. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2011. Communications in Computer and Information Science, vol 149. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21512-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-21512-4_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21511-7
Online ISBN: 978-3-642-21512-4
eBook Packages: Computer ScienceComputer Science (R0)