The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In industrial automation, EtherCAT is a real-time communication protocol widely employed in the local computer networks for fast and predictable data communication between system processes. End-to-end delay is a key performance indicator to industrial applications as it reflects the real-time capability of the system. This paper explores end-to-end delays of EtherCAT-based control systems under different...
Crowd sensing exploits users' smart devices and human mobility to collect information on a large scale. To realize a crowd sensing campaign, sensing tasks with spatio-temporal requirements are distributed to the devices that can provide the requested information. Typically, the distribution of sensing tasks relies on a centralized communication infrastructure such as cloud servers. However, such an...
Bulk data transfer is facing significant challenges in the coming era of big data. There are multiple performance bottlenecks along the end-to-end path from the source to destination storage system. The limitations of current generation data transfer tools themselves can have a significant impact on end-to-end data transfer rates. In this paper, we identify the issues that lead to underperformance...
In order to provide ubiquitous communication, seamless connectivity is now required in all environments including highly mobile networks. By using vertical handover techniques, it is possible to provide uninterrupted communication as connections are dynamically switched between wireless networks as users move around. However, in a highly mobile environment, traditional reactive approaches to handover...
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost of copyright infringement to the film and music industries range in the tens to hundreds of billions of dollars every year. The vast majority of this illegal content is shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, illegal file streaming, and one-click...
We consider a mobile-CDN system where base stations (BSs) are equipped with storage for replicating and distributing content. In such a system, BSs cooperation in replying user requests is a widely adopted mechanism. For such cooperative caching, a key issue is the joint optimization of content placement and request redirection, which has been intensively investigated in the literature. However, optimizing...
In wireless coded cache network, data contents are cached in a number of mobile devices using an erasure correcting code, and a user retrieves content from other mobile devices using device-to-device communication. In this paper, we consider the repair problem when multiple devices that cache data contents fail or leave the network. By exploiting the wireless broadcast nature, we formulate the repair...
Distributed controller architectures in software defined networks raise the issue of switch-controller mapping. In a mapping approach where a switch distributes flow setup requests (traffic) to multiple controllers, a solution that finds the optimal switch-controller mapping and traffic distribution among the controllers for long term performance and responds effectively to network events such as...
Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
A variety of wireless communication links today, such as HSPA+ access in high speed trains, balloon-based aerial wireless networks and satellite Internet connections have high loss rates. In such environments, Multipath TCP (MPTCP) offers a robust solution compared to regular TCP. However, MPTCP and existing schedulers suffer from performance degradation for both constant bit rate (CBR) and bulk traffic...
Content-Centric Networking (CCN) is a recently proposed Internet paradigm that focuses on scalable, secure and efficient content distribution. The main abstraction is named and addressable content. A consumer requests desired named content by generating a so-called interest, which is then routed by the network towards an in-network cached copy, or the authoritative producer, of that content. Since...
With the Internet becoming the dominant channel for business and life, web proxies are also increasingly used for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets.,,,,In this paper, using thousands of web proxy URLs crawled, we performed a large-scale study on the DOM (Document Object Model) structure features...
Nowadays cloud services have become a cost-effective platform for sharing data and performing large scale computations. As outsourcing data to a third party involves security and privacy concerns, data should be sent to the cloud in encrypted form. To handle access control on encrypted cloud data, Ciphertext-Policy Attribute-based Encryption (CP-ABE) has become very popular. In this scheme data can...
In this paper, we jointly consider communication, caching and computation in a multi-user cache-assisted mobile edge computing (MEC) system, consisting of one base station (BS) of caching and computing capabilities and multiple users with computation-intensive and latency-sensitive applications. We propose a joint caching and offloading mechanism which involves task uploading and executing for tasks...
We present sec-cs, a hash-table-like data structure for contents on untrusted storage that is provably secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between...
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces the end-to-end latency on the user side but also offloads Content Providers (CPs) providing resilience against Distributed Denial of Service (DDoS) attacks. However, by caching objects and processing users' requests, CDN service providers...
The size of router forwarding tables is a critical aspect of the quality of a network design. Oversized forwarding tables not only force enterprises to purchase expensive hardware, which is a significant operational cost, but also make issues such as power consumption and heat generation more prominent. The size of forwarding tables is a direct result of the IP prefix assignment scheme. Unfortunately,...
The current ecosystem of network elements, such as switches and appliances, is largely dominated by devices supplied and sold with a bundled operating system, and software dedicated to manage the device's forwarding hardware, however, these platforms are not open-source and cannot be arbitrarily customized, and there is no cost transparency or flexibility in choosing software different to the bundled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.