The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To receive location‐based services (LBS), users must disclose their locations and queries to the LBS server, which can expose the user's identity, location, and other information. Recently, techniques for protecting user privacy using dummies have been researched. However, many factors, such as the distance between the obstacles and the dummies, must be considered in order to create dummies. Therefore,...
The article is a concise presentation of the results of the research in the area of increasing the efficiency of energy consumption for the process of collecting spatio-temporal data with the wireless geosensor networks. Energy saving is a very significant consideration in the design of those systems, since geosensors used for environmental monitoring have limited possibilities for recharge of the...
Security is the challenge that world community will need to overcome for the Internet of Things (IoT) comes true. It needs to protect IoT users from known and potential attacks. The traditional approach for security system design is expected to fail, because most threats in IoT environment will be previously unseen and many IoT devices have constrained computing resources. The recent surveys of intrusion...
In the near future, networked wireless devices outnumber traditional electronic appliances. Internet of Things will enable a plethora of new applications in environmental monitoring, agricultural industry, medical diagnostics, security and transportation business, in analysis of equipment performance, conditions, troubleshooting and monitoring. Nowadays, the concept of wireless sensor networks is...
As sensors based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensors resources including poor sensors batteries. It leads to sensor vulnerability for battery exhausting attacks. Besides, fast exhausting of sensor battery power is not only explained by intrusions. It can be explained by a random failure...
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they can be economically deployed in large numbers, they generally have very limited battery capability. Thus, a lifetime of a sensor is degraded under Denial of Sleeping attack. In this paper a mathematical model for performance...
Over the past few years wireless sensor networks applications have evolved from a stage where these networks were designed in a technology-dependent manner to a stage where some conceptual understanding issues now exist. As wireless sensor networks are deployed, energy consumption emerges as a core requirement. Recent advances in energy harvesting technology for wireless devices have increased the...
In various assessments of potential intrusions in modern networks, the flooding-based DDoS attack takes center stage. The main purpose of this paper has been to review DDoS flooding attacks in optical burst switching networks and analyze their impact. A set of optical network protocol vulnerabilities have been identified. Countermeasures against the intrusion have been discussed.
The admission control mechanism inspired in the framework of proportional differentiated services has been investigated. The mechanism provides a predictable and controllable network service for real-time traffic in terms of blocking probability. Implementation of proportional differentiated admission control is a complicated computational problem. Previously, asymptotic assumptions have been used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.