The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) devices pose a serious threat to the web as poorly configured or faulty devices can be used for massive Distributed Denial of Service attacks. High jacked IoT devices that act like real users are a particular problem that present significant difficulties for traditional detection methods. An adaptive, real time scoring system for detecting such attacks is proposed that does...
This paper presents an adaptive robotic swarm of Unmanned Aerial Vehicles (UAVs) enabling communications between separated non-swarm devices. The swarm nodes utilise machine learning and hyper-heuristic policy evolution to provide agility within the swarm, enabling each swarm member to select the most appropriate mobility policy for the environment given the swarm's abilities. The swarm evolution...
Previous work has developed a remarkably low cost method which allows IoT devices to securely join domestic WiFi networks. Implementation of this method has uncovered a weakness in that only controllers (usually smart phones) capable of programmatically controlling hotspot mode can successfully implement the protocol. It is demonstrated that this weakness greatly compromises the open nature of this...
Congestion presents a significant challenge in ad hoc networks due to their unstructured and distributed nature. In most congestion detection schemes for such networks, the affected node itself detects whether it is congested or not. The detection approach proposed in this paper performs detection with information estimators from neighbouring uncongested nodes that may be able to relieve the congestion...
Surprisingly little research has quantified the severity of Wi-Fi congestion in densely populated areas. We performed a high-fidelity 3D simulation of the performance of a realistic Wi-Fi deployment in a typical apartment block. Our results show that congestion leads to significant loss of performance, and that current channel selection procedures have only little effect. Also the strategy that is...
In this paper, for constructing flexible underwater wireless sensor network, we discussed an underwater visible light communication system with simultaneous power transfer. For realizing the system, the received optical power is used for both data communication and power transfer, and it is necessary to design the receiver for separating the signal to alternate current (AC) and direct current (DC)...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The second wave of cloud computing, named network cloudification, in the forms of SDN (Software Defined Networking), NFV (Network Function Virtualization), and 5G-MEC (Mobile Edge Computing), is to centralize and virtualize networking into data centers. It enables operators to offer NaaS (Networking as a Service) with much lower CAPEX and OPEX with larger flexibility because devices become simpler,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Recently, a tremendous interest has been concentrated on the design and development of wireless sensor networks (WSNs) — distributed systems comprised of numerous wireless, sensor devices deployed densely in a sensing area. Battery powered sensors need efficient management due to limited energy resources, and energy conservation is a vital design issue that needs to be boosted in order to increase...
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
In the age of Internet of Things (IoT), sensors form a foundational component of IoT services, yet they are rigid with little capability for programmable configuration or reusability as they are application-specific, manufacturer-specific. Emerging IoT applications often deploy a vast number of sensors which may serve multiple applications. Programmability is thus essential but not found in legacy...
There is little work which empirically analyses network management practice with respect to policy creation and maintenance. To address this gap we carried out five semistructured interviews of network administrators at a diverse range of enterprises. Analysis of the results led us to make the following contributions: We introduce a number of high-level orthogonal concepts (dimensions) for representing...
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
Traffic Engineering (TE) accommodates traffic efficiently by dynamically configuring the routes so as to follow traffic changes. If traffic changes frequently and drastically, the interval to perform the route reconfiguration should be set to a short value, to follow traffic changes. To shorten the interval, obtaining the traffic information becomes a problem; measuring traffic information accurately...
The traditional world has transformed into a digital society where almost anything can be accessed from anywhere. However, this digital society is responsible for an explosive growth of high-volume, high-velocity and high-variety information assets, with high demand for “Big Data”. A Software Defined Connectivity (SDC) is an emerging paradigm, which promises to simplify network management, to provide...
This study evaluates the current state of wireless network security in the CBD of Nuku'alofa. Wireless Networks have grown significantly since their introduction. Security protocols supplied with the wireless equipment have reached a level of strong and robust security. However, security remains a problem; this study aims to answer two questions. What is the status of wireless network growth and security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.