The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The postMessage feature in HTML5 allows web components of different origins to communicate with each other. However, the message receivers do not differentiate the origins of a message, making information leakage possible. Being aware of this vulnerability, We examine its implication under the context of Single Sign On (SSO) mechanism. Nowadays, many websites integrate SSO to facilitate easier user...
With the rapid development of the Internet of Things (IoT), the new challenges brought by the MTC traffic imposed a great pressure to the traditional cellular networks. The new MTC features like small-data transmission, large number of devices and deep fading channels will lead to a significant spectrum efficiency degradation and thus affect the regular Human-to- Human (H2H) communications. In this...
The development and deployment of the Locator/ Identifier Separation Protocol (LISP), a paradigm introducing several benefits to the Internet architecture, is becoming widespread thanks to initiatives like the LISP-Lab project. Yet, LISP remains a relatively recent technology, hence, its actual performance when integrated with the current Internet remains still to be assessed. To tackle this issue...
As a high-tech industry, the development of the Internet of Things industry plays an important role in the industrial transformation and upgrading of a country. In light of the six elements of the “Diamond Model”, this paper constructs an indicator system to assess the competitiveness of the Internet of Things industry. Using a comprehensive evaluation method which combines Gray Relational Analysis...
With the fast development of Wireless Sensor Networks (WSNs) and RFID technology, many Internet of Things (IOT) applications have been deployed in recent years. Smart home energy management systems form part of the smart grid program and are a fast developing smart home application area. Inadequate security is a big issue in smart home energy management systems. Most security protocols widely used...
This paper proposes a dynamic partial reconstruction multicast routing algorithm (DPRA-MAODV), based on the analysis of MAODV agreement, combine with the dynamic partial reconstruction protocol. The creative use of the concept "event trigger", efficient implementation of partial reconstruction operation about the dynamic multicast tree in Ad hoc network, to optimize the total cost of the...
This article describes the KWP2000 protocol interface design in the body control module and the related information acquisition mode in vehicle body control module, using the MC33972 chip to multi-sample analog signal. The fault diagnosis will be known through KWP2000 bus according the sampling data after MCU judge error. The technology described in this article can be widely used in the design of...
The network control of CNC machine is the inexorable development trend of modern manufacturing industry, and the combination of embedded technology with network has become a research hot. This paper puts forward a novel design idea of remote monitoring and controlling system of CNC machine based on embedded Internet, presents its architecture principle design and software-hardware implementation procedure...
The ability to establish an objective comparison between high-performance TCP variants under diverse networking conditions and to obtain a quantitative assessment of their impact on the global network traffic is essential to a community-wide understanding of various design approaches. Small-scale experiments are insufficient for a comprehensive study of these TCP variants. We propose a TCP performance...
In this paper, a novel analytic framework of cross-layer design between physical and network layers is devised to enable an efficient communication link under various channel qualities. Based on the principle of maximum entropy (ME), the performance modelling and evaluation of a wireless channel with bursty multiple traffics and automatic repeat request (ARQ) traffic flows subject to intelligent buffer...
Due to the growth of Wireless Sensor Networks (WSN), many advanced applications such as industry process monitoring, patient monitoring and public service communications have been deployed. Security of data will be an important factor for their full adoption. Efficient key exchange protocols are required for Security of large scale densely deployed wireless networks of resource limited sensor nodes...
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.