The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Acoustic ranging based indoor positioning solutions have the advantage of higher ranging accuracy and better compatibility with commercial-off-the-self consumer devices. However, similar to other time-domain based approaches using Time-of-Arrival and Time-Difference-of-Arrival, they suffer from performance degradation in presence of multi-path propagation and low received signal-to-noise ratio (SNR)...
Ethernet plays an important role in the layer 2 network. Unfortunately, the tremendous Address Resolution Protocol (ARP) broadcast traffic among massive hosts limits the scale of Ethernet. Recently, Software-Defined Network (SDN) has been proposed to suppress broadcast traffic by centralized control. However, existing approaches based on SDN suffer from an adaptability limitation as they cannot independently...
When the measure ship berthing or sailing, it is vulnerable to waves, tidal currents and other complex disturbance. The measurement precision of servo system is related to error and the inertial force caused by measurement ship swing and displacement as well as subgrade. So it is necessary to improve the accuracy of the ship servo system. The active disturbance rejection control (ADRC) algorithm has...
The detection theories and methods of Hardware Trojan (HT) in ASIC have been mature with the vigorous development of integrated circuit (IC) security. However, the detection theories and methods of hardware Trojan in third party IP cores develop slowly when IP cores are used widely, thereby it results severe secure problems during use of IP cores. In this paper, we analyzed structure features of less-toggled...
The inter-domain routing protocol of the Internet, i.e., Border Gateway Protocol (BGP), is vulnerable to malicious attacks. Although many security solutions for BGP have been proposed, they have mainly focused on topology-based security. Policy-based security has largely been overlooked—a severe concern especially since BGP is a policy-based routing protocol. In this paper, we present an Expectation...
Ternary Content Addressable Memory(TCAM)-based multidimensional tables are widely used to implement Access Control Lists (ACLs) for Internet packet classification and filtering, and have also become attractive for constructing the forwarding tables of Internet routers and the flow tables of Openflow switches, where multiple fields are generally used to match incoming packets. However, as such tables...
Distributed reflective denial of service (DRDoS) attacks, especially those based on UDP reflection and amplification, can generate hundreds of gigabits per second of attack traffic, and have become a significant threat to Internet security. In this paper we show that an attacker can further make the DRDoS attack more dangerous. In particular, we describe a new DRDoS attack called store-and-flood DRDoS,...
Intrusion detection Systems(IDS) can produce large amount of alert data which usually possesses the characteristics of high redundancy and high repetition. Such kind of data makes the event processing for network security significantly difficult. Current cluster algorithms use cluster center to calculate the distance which leads to fairly big calculation errors. In order to aggregate the massive alert...
Handling link failures is the fundamental task of routing schemes. Routing protocols based on link state (e.g., OSPF) require a global state advertisement and re-computation when link failure happens, and will cause inevitable delivery failures. To improve the routing resilience without introducing significant extra overhead, we propose a new routing approach, Keep Forwarding (KF) to achieve k-link...
Content Centric Network (CCN), a typical incarnation of the Information Centric Network (ICN), which is an active research topic of Future Internet Architecture. Naming the content's chunks, retrieving and forwarding the content chunks according to their names are the core ideas of CCN. But the length of the content's name is variable length, which is an obvious difference from the IP address in the...
Due to operational malpractice or security attacks, an IP prefix (i.e., a block of IP addresses) can undergo many types of routing anomalies. Perhaps the most well-known of such anomalies is prefix hijacking, where an attacker hijacks traffic meant to reach the legitimate user of a prefix. Anomalies can also easily occur through route leaks, which can disrupt traffic for numerous prefixes at once...
Archiving Internet traffic is a function essential for retrospective network event analysis. The state-of-art approach for network monitoring and analysis is storing and analyzing the statistics of network flows. However this approach loses much valuable information inside Internet traffic. With the advancement of commodity hardware, especially the volume of storage device and the speed of interconnect...
Machine-to-machine (M2M) communication represents an important new class of applications for the future “Internet of Things (IoT)”. The IoT scenario requires scalable connectivity to billions of embedded devices such as sensors, RFID's and machines. Current sensor networking solutions involve the use of gateways for hierarchical access to sensor devices, but this approach leads to specialized M2M...
IP satellite switching system, one of the directions for communication satellite, can connect satellite and Internet seamlessly. This system can realize each station to communicate with others conveniently. In this paper, an open-loop onboard congestion control algorithm based on IP layer is simulated. The results of simulation show that the proposed algorithm can decrease the cell loss rate by sending...
The routing scalability and IP address exhaustion are two significant issues the current Internet faces. The "locator/identifier (Loc/ID) split" has become a well recognized design principle for future Internet architectures that make Internet routing more scalable. In this paper, a novel Loc/ID split routing and addressing architecture called IPv4+6 is proposed. It not only solves the routing...
In recent years, structured P2P communications is being widely used for its features of self-organization as well as good scalability and flexibility. To make sure that every node can participate in such a network whether it is behind a NAT or not, we must solve the NAT traversal problem. However, existing NAT traversal methods all need the support of a centralized server which will destroy the distributive...
The convergence of IP network over broadcasting transmission systems is a feasible solution towards the next generation wireless broadband multimedia network for large numbers of users and Internet service providers. Taking the characteristics of IP over broadcasting network into account, this paper proposes a novel Dynamic Differentiated Service Management (DDSM) to provide QoS guarantee for delivering...
Conventional techniques for combating phishing have focused primarily on detecting phishing web sites and preventing users from revealing their passwords to such sites. This passive form of defense is by its nature incomplete and does nothing to protect users that do reveal their passwords. Combating the phishing threat requires more than simple avoidance-it requires a more active approach to disrupting...
Packet classification is still a challenging problem in practice under large number of classification rules and constant growth of performance requirement. Most of the existing algorithms try to solve the problem heuristically by leveraging on the inherent field-level characteristics of the rules. This paper proposes a bit-level heuristic framework: discrete bit selection (DBS) for multi-dimensional...
Digital video broadcasting (DVB) technology has been successfully deployed in providing digital broadcast services to wide areas. The required new convergent technologies are considered on enabling the broadcast transmission systems more suitable for the Internet services, such as efficiently encapsulating IPv4 and IPv6 protocol data units into DVB/MPEG-2 transport streams. To evaluate and test the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.