The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A common problem in any large grocery store is to make sure the customers find the right product of their choice quickly. The problem gets worse when large grocery stores hold several thousand products and when customers have time constraints, it becomes way too difficult for customers to find the required product quickly. Often customers end up not purchasing the product of their preference just...
The design of efficient key management protocols for wireless sensor networks (WSNs) is a challenging task. To be robust and adaptable to many WSN applications, the key management protocol should not only be lightweight but also should support both pair-wise and group-wise communications. Many previous works have focused on developing efficient pair-wise key management protocols in WSNs. Very few...
There has been a tremendous interest in recent years in the design of mobile ad hoc networks (MANETs) because of their dynamic topology, self-organization and ease of deployment. However, the lack of security in their routing protocols make MANETs vulnerable to a variety of routing intrusions that can compromise the data or the entire network itself. This paper presents a novel scheme for the detection...
RFID systems are vulnerable to many types of malicious attacks, ranging from passive eavesdropping to complete denial of service (DoS). Hence it is becoming increasingly important to develop and design intrusion detection and prevention mechanisms for RFID. One of the ultra lightweight techniques to prevent DoS on RFID systems is the Gossamer protocol. In this paper, we show that although the Gossamer...
The increasing popularity of secure group communications has been witnessed in collaborative environments for a long time. Contributory group key schemes are deployed to secure dynamic peer group communications. A number of group applications in resource-limited networks require that the group key scheme should be performance-efficient and failure- tolerant. We present a Diffie-Hellman-based contributory...
This paper reports the experimental results of the analysis of routing intrusions and vulnerabilities in wireless ad hoc networks. A mobile ad hoc network test bed has been implemented, and a set of routing intrusions has been launched on the test bed. For each intrusion, its description, identification of the vulnerabilities that enable an adversary to launch this intrusion, and experimental analysis...
Providing flexible quality of service (QoS) for multiple classes of traffic is one of the important challenges in the design of optical burst switching (OBS) networks. In this paper, we propose a novel bandwidth reservation scheme for periodically scheduled bursts. Multi-protocol label switching (MPLS) is used to construct reliable burst delivery channels across the network. Meanwhile, best effort...
Link adaptation is one of the key technologies used in high speed wireless networks such as HSDPA and mobile WiMAX. The dynamic feature of mobile users' channel capacities brings challenges to the call admission control algorithm deployed for such networks. Our aim in this paper is to develop an admission control scheme that handles the intra-cell mobility issue in the downlink of broadband wireless...
The next generation wireless network is an overlay network, in which AAA (authentication, authorization and accounting) is performed across domains. The current IETF AAA architecture causes long authentication delays during handoffs. In this paper, we propose a new network trust model to simplify the key management among networks. Based on this, a protocol is designed to shorten the delays
The design of micro-mobility management protocols stands out as an important challenge in integrating wireless networks into the IP-based Internet, especially when such networks are deployed for real-time multimedia applications. We present a new load balancing hierarchical model for micro-mobility management for the wireless access network. The scheme includes a novel anchor selection algorithm....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.