The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study how to provide optimal performance guarantee in multi-resource scenarios, such as Network Function Virtualization (NFV), where Virtual Network Function (VNF) resource demands of one Service Function Chain (SFC) are elastic and correlated with the end-to-end throughput of SFC. Previous works such as Dominant Resource Fairness (DRF) achieve this goal only if the demands are already...
Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication technologies that may require synchronization with the medical team. Even though wireless technology offers satisfaction to the patient's daily life, it is still prone to security...
The rapid growth of mobile network traffic has posed a serious challenge to the limited spectrum. The United States Federal Communications Commission (FCC) allowed the utilization of unused TV White Space (TVWS) by unlicensed secondary users (SUs). Particularly, the IEEE 802.19.1 standard is proposed to regulate the coexistence of dissimilar or independently operated SU networks and devices on the...
Due to the widespread research on Smart Identifier NETwork (SINET), its security has received much attention recently. But most of those attempts consider SINET security from the specific attack perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of separation mechanisms in SINET. Therefore, this paper provides a different approach to security...
The wide spread of mobile devices has also caused the explosive growth of malwares. Application behavior analysis is a popular technique to fight against malwares. However current app behavior analysis methods still have some limitations. For example, many popular dynamic analysis methods are built on Dalvik virtual machines. They cannot disclose the behavior of native code. VMI based methods can...
Web Security Gateway (WSG) is a new type of network security product that maintains the security of trusted networks. In this paper, a WSG model for evaluating WSG performance is presented. This paper advances discussion of previous studies on series services under multiple service windows. The proposed model consists of a two-stage queuing system. The first stage is a network layer simulation. The...
LTE-satellite mobile communication system integrates satellite communication technology and LTE standard, and possesses special superiorities in providing mobile communication services. In consideration of the particularities of the satellite communication, traditional correlation based timing estimation schemes are not competent for rapid and effective adjustment of timing advance in LTE uplink....
Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication...
Network Function Virtualization (NFV) has the potential to significantly reduce the capital and operating expenses, shorten product release cycle, and improve service agility. In this paper, we focus on minimizing the total number of Virtual Network Function (VNF) instances to provide a specific service (possibly at different locations) to all the flows in a network. Certain network security and analytics...
In this paper, we propose a scheme to protect the Software Defined Network(SDN) controller from Distributed Denial-of-Service(DDoS) attacks. We first predict the amount of new requests for each openflow switch periodically based on Taylor series, and the requests will then be directed to the security gateway if the prediction value is beyond the threshold. The requests that caused the dramatic decrease...
With the rapid development of science and technology, unmanned aerial vehicles (UAVs) gradually become the worldwide focus of science and technology. Not only the development and application but also the security of UAV is of great significance to modern society. Different from methods using radar, optical or acoustic sensors to detect UAV, this paper proposes a novel distance-based support vector...
In smart grid, large quantities of data is collected from various applications, such as smart metering substation state monitoring, electric energy data acquisition, and smart home. Big data acquired in smart grid applications is usually sensitive. For instance, in order to dispatch accurately and support the dynamic price, lots of smart meters are installed at user's house to collect the real-time...
Trust plays an important role in helping social network user make appropriate decision from abundant social information about products. A variety of social review information (e.g. ratings, voting and tags) emerge with the huge number of products on the Web. How they are utilized for searching and finding appropriate item is investigated. In this paper we propose a user credibility calculation method,...
Recently, an increasing number of inter-app attacks such as confused deputy attacks, data leakage attacks and collusion attacks spring up. However, there is no perfect defense method against them. As we all know, developers play an important role in android security, but their weak consciousness about the security may lead to inter-app attacks. Therefore, considered for developers, it is important...
Along with the miniaturization of various types of sensors, a mass of intelligent terminals are gaining stronger sensing capability, which raises a deeper perception and better prospect of Internet of Things (IoT). With big sensing data, IoT provides lots of convenient services for the monitoring and management of smart cities and people's daily lives. However, there are still many security challenges...
With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access...
In cognitive radio networks, cooperative spectrum sensing(SS) between cognitive users can improve the detection performance, reduce the testing time. However, a large amount of data interaction restrict its application and increase the consumption of resources. For the demand of cooperative SS, this paper improved the compression algorithm based energy detection which in the early stage of the work,...
With the support of cloud computing, large quantities of data collected from various WSN applications can be managed efficiently. However, maintaining data security and efficiency of data processing in cloud- WSN (C-WSN) are important and challenging issues. In this paper, we present an efficient data outsourcing scheme based on CP-ABE, which can not only guarantee secure data access, but also reduce...
Intrusion detection plays a critical role in security of people's possessions. Approaches such as video-based, infrared-based, RFID, UWB, etc. can provide satisfying detection accuracy. However, they all require specialized hardware deployment and strict using conditions which hinder their wide deployment. Beyond communication, WLANs can also act as generalized sensor networks and there are several...
Location-based social networks (LBSNs) make it possible for servers to record users' location histories, mine their life patterns, and infer individual preferences. As an important component of LBSNs, recommender systems gained popularity in recent years. Recommender systems can automatically list candidate locations for users according to their preferences, which is different from traditional search...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.