The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A network of meteor stations is being deployed in Morocco with the aim to determine meteor trajectories and their relationships with possible parent bodies. Several meteor showers may be related to known parent bodies, such as the the comet 109P/Swift-Tuttle, which is associated to Perseids. Two stations of meteor observations with Watec cameras were recently installed in Morocco as part of this network,...
Wireless Sensor Networks (WSNs) operate in hostile environments under resource-constrained conditions. Power conservation is a primary factor that drives the design of these networks. Therefore, WSNs should not utilize complex algorithms that are power-hungry. The IEEE 802.15.4 standard is the appropriate suite of specifications that conforms to the distinguished characteristics of WSNs. This standard...
BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the security issues of the BGP protocol. Among them, SBGP offer secure and guaranteed means to distribute route reachability information. However, the assumption...
The application of Wireless Sensor Networks (WSNs) in Intelligent Transportation Systems (ITSs) has been the topic of extensive research in the last decade. Various aspects of WSNs have been addressed in the context of transportation networks. In particular, the different aspects of security (confidentiality, integrity, and availability) strongly enticed the research devoted to ITSs. However, those...
The emergence of, and advancement in, integrated digital circuitry technology along with the development of efficient software algorithms made it possible to build small, lightweight wireless nodes equipped with embedded processors, sensors and radio transceivers. By densely deploying these nodes, in a highly distributed manner, we can build a Wireless Sensor Network (WSN). In this network, sensors...
Border Gateway Protocol (BGP) is the de-facto routing protocol in the Internet. Unfortunately, it is not a secure protocol, and as a result, several attacks have been successfully mounted against the Internet infrastructure. Among the security requirements of BGP is the ability to validate the actual source and path of the BGP update message. This is needed to help reduce the threat of prefix hijacking...
Technological progress in the medical field has led to the design of a set of software and hardware tools that enable real-time monitoring of the patients. To reduce the rising cost of hospitalization, researchers are building Smart Hospital Environments, which are designed to connect the patient's home to a virtual clinic continuously monitored by health experts. Some of the major concerns that still...
Recent advancements in computing and digital signal processing technologies have made automated identification of people based on their biological, physiological, or behavioral traits a feasible approach for access control. The wide variety of available technologies has also increased the number of traits and features that can be collected and used to more accurately identify people. Systems that...
There are immediate needs for audio/visual surveillance systems in a large number of areas including law enforcement, military, commercial, and personal security. A series of cameras connected to a local ldquomonitoring centerrdquo via a wireless mesh network can provide instantaneous ad-hoc monitoring of several environments. However, there are several issues that must be resolved particularly when...
An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without knowing the encryption key. There has been no...
Intrusion Detection Systems (IDS) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is very central to ensure the performance, speed of learning, accuracy, reliability of these detectors and to remove...
The fast improvements in a variety of technologies such as microprocessing, sensing material, and most importantly wireless technology resulted in development of the wireless sensor network technology. Wireless sensors that can be either implantable inside the human body or wearable by individuals are called the wireless biosensors. The wireless biosensors are used to gather real time and continuous...
Many security surveillance solutions include the employment of a large number of cameras to monitor areas of interest. Despite the benefits of large-scale camera-based surveillance systems, monitoring and controlling a large number of cameras can be problematic given the vast information that must ultimately be processed. In this paper, we present a visual-based three-dimensional graphical user interface...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.