The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper we improve QoS (Quality of Service) in the swarm of micro UAVs (Unmanned Aerial Vehicles) connected by 802.11n standard and AODV routing protocol using peer selection algorithm that is implemented at the application layer of OSI model. We compare contention-based, greedy and predictive approaches to peer selection in FANET based on Packet Delivery Ratio (PDR) in source-destination transmission...
As peer to peer systems work in open environment, they are highly susceptible to malicious activities. Formation of trust relations between the peers help to minimize the impact of such attacks. This paper proposes a collaborative trust based model that works on reputation and recommendations metrics to increase trustworthiness amongst the peers for reliable services. Under this model, evaluator contacts...
Maintaining communication among the population, during and in the aftermath of disasters, is key to the success of both response and recovery efforts. Evidently, the telecommunications infrastructure most often fails in these situations and thus adhoc solutions ought to be devised. However, unlike customary adhoc solutions that focus on the traditional end-to-end communication paradigm, in emergency...
The evolution of ubiquitous computing, Internet of Things and social networks has increased the need for secure and reliable data communication among users. The existence of this communication relies on the level of Trust among users and entities. Trust is a complex issue as it lies in the complexity of human behavior. Thus, dynamic trust management is important as it enables the assessment of the...
Mobility is the most issues for the majority ofprotocols including the RPL (IPv6 Routing Protocol for LowPower and Lossy Networks). RPL a routing protocolstandardized by IETF is usually used in Internet of ThingsTechnology. It is proposed to support communications in Lowpower and Lossy Networks (LLNs). However, mobility limitsthe use of RPL protocol in realistic study. In this paper wehave classify...
The general method available for comparison between the Distributed Hash Table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lookup service with lookup retries for failed lookups, both average latency per successful lookup as well as percentage of successful lookups are key to evaluate the performance. Although,...
With the growing number of smartphone users, peer-to-peer ad hoc data forwarding is expected to occur more often. The forwarding performance improves when knowledge regarding the expected topology and the social context information of the networks. In this paper, we introduce a new metric for data forwarding based on social context information, in which node's social context information is used to...
This report analyses security threat of a covert channels to popular P2P networks and their support protocols, like Kademlia, Mainline DHT. This kind of a threat was almost unattended by majority of researchers, despite its considerable potential dangerousness. Using a new, comprehensive approach to the analysis of the covert channels, based on previously proposed generalized model of covert channel,...
Current proposals for chaining service functions (SFs) do not address some critical management issues, such as the discovery of SF instances close to IP data paths. This information is crucial for deploying complex services both in large cloud networks, where SFs may be moved or replicated, and in the emerging fog/mobile edge computing systems. For this purpose, in this letter, we propose the distributed...
In this work we investigate decentralized content exchange among tourists who are mostly strangers, depicts irregular movement patterns and most likely not to have any prior social relationship or difficult to establish any in a tourist spot. We incorporate user's interest, trustworthy online recommendations, and place-centric information to facilitate content exchange in such tourist destinations...
Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower...
The quality of P2P streaming video is generally evaluated using objective or subjective metrics. But this task is even more complex in wireless multi-hop environments. In this paper we developed a statistical framework to evaluate the quality of Peer-to-Peer (P2P) video streaming on multi-hop wireless networks. First, we determine the factors that influence the performance of the P2P video streaming...
Intermittently Connected Mobile Networks (ICMNs) are sparse wireless networks where most of the time an end-to-end path does not exist from source to destination. These networks are characterized by opportunistic connectivity, long and variable delay, asymmetric data rate and high error rate. Hence, they can be appropriately modeled as Delay-Tolerant Networks (DTNs). In this paper, the performance...
Trust is becoming an increasingly important issue in large-scale distributed systems. Especially self-managed systems from the Autonomic and Organic Computing domains consisting of several cooperating entities have to rely on an automated estimation how reliable and trustworthy potential cooperation partners are. In this paper, we introduce a novel concept to represent trust among those entities....
Various trust models have recently been proposed in order to develop trust-based security and/or network services. Although the trust models have been tested through extensive simulation to verify and validate their performance gains, there has been little effort to validate the models using network emulation to provide more realistic network characteristics. In this work, we present trustd, a trust...
In this paper, we propose a novel routing protocol by overcoming the security issues of node disjoint multipath routing protocols to ensure the reliability by discovering multiple secure paths. The proposed protocol considers link compromise probabilities to generate multiple routes with low compromise probabilities. Contrary to contemporary distance metric multipath routing protocols, our proposed...
Adopted in late 2011, IEEE 802.11s comes as the first industry standard to enable vendor-independent and inter-operable WLAN mesh networks. Featuring automatic device interconnection and routing, they provide a higher scalability, flexibility, and robustness compared to common centralized WLAN infrastructures. The 802.11s standard defines mandatory support of the Hybrid Wireless Mesh Protocol (HWMP)...
Big data revolution has created an unprecedented demand for intelligent data management solutions on a large scale. While data management has traditionally been used as a synonym for relational data processing, in recent years a new group popularly known as NoSQL databases have emerged as a competitive alternative. There is a pressing need to gain greater understanding of the characteristics of modern...
Social Networking analysis has recently gained a lot of research interest because of social media like twitter, facebook, blogs or customer review sites. The emerging online environment let people buy and sell goods, play and recommend product to others without knowing the remote partner. In real life, we come to know about others reputation through our social circle. However, it is not always sufficient...
The growing demand of computational resources has shifted users towards the adoption of cloud computing technologies. Cloud allows users to transparently access to remote computing capabilities as an utility. The volunteer computing paradigm, another ICT trend of the last years, can be considered a companion force to enhance the cloud in fulfilling specific domain requirements, such as computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.