Steganography in Ad Hoc Networks

A wireless ad hoc network is a continuously self-configuring, infrastructure-less decentralized type of wireless network. An important concern in wireless ad hoc environment is secure transmission of information. This paper is a combined contribution to the field of steganography and ad-hoc networks. Various ad hoc networks attacks are studied and steganography methods to help fight them in order to give a new approach to security in ad hoc networks. The proposed solution attracts more importance as it ensures two layers of security through secret asynchronous data sharing through different paths along with using steganography concepts.

Spotlight

Calsero

We are Veteran owned and ran with over 25 years of combined experience in Information Security, both in and out of the Military. We offer Network Security Analysis and Penetration Testing, Open Source Intelligence and Risk Analysis, Data Recovery, Cloud Security Consulting and more. Data breaches and hacking are a quickly becoming a common occurrence, it is essential that your business is protected. We provide the security services you need and the customer service you want. We believe that secure data and customer service should go hand in hand. To do this, we focus our attention on local businesses and provide the information security consulting they need in today's hostile cyber-space.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

Cloud Native Security Model

whitePaper | December 23, 2022

Moving to the cloud is more than a technical transition to a new platform. It is a core part of an enterprise's growth strategy and while strategically important, it can also be potentially disruptive.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More

Spotlight

Calsero

We are Veteran owned and ran with over 25 years of combined experience in Information Security, both in and out of the Military. We offer Network Security Analysis and Penetration Testing, Open Source Intelligence and Risk Analysis, Data Recovery, Cloud Security Consulting and more. Data breaches and hacking are a quickly becoming a common occurrence, it is essential that your business is protected. We provide the security services you need and the customer service you want. We believe that secure data and customer service should go hand in hand. To do this, we focus our attention on local businesses and provide the information security consulting they need in today's hostile cyber-space.

Events