The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Networking (SDN) benefits from the development flexibility of control-plane applications (SDN-Apps), which allows third parties to make contributions. Such flexibility may expose SDN networks to security threats, since SDN-Apps may be malicious or prone to implementation bugs. These buggy/malicious SDN-Apps may contaminate the data plane with abnormal network actions, which may not...
Real world sensor network deployments and prototype implementations are still a challenging research and development area for scientists and engineers. We present a prototype implementation of a ubiquitous monitoring system (UBIMOS) applying wireless sensor networks. The monitoring system is designed for use by various operation teams, especially by critical rescue and communication teams. With its...
An new environment monitoring system of household security robot is proposed based on wireless sensor networks, which is composed of the robot node and the sensor nodes for monitoring temperature and humidity, gas leaking, fire and housebreaking in family. A robot centering on network topology structure is presented and realized. all of the sensor nodes information in the network will be sent to the...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address cooperation stimulation in realistic yet challenging contexts where the environment is noisy and the underlying monitoring is imperfect. We have first explored the underlying reasons why stimulating cooperation under such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.