The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long Term Evolution (LTE) was developed by 3GPP to cope with the increasing demand for better Quality of service (QoS) and the emergence of bandwidth-consuming multimedia applications. Today's data transmission networks face extreme challenges in providing high data rate and low latency. Scheduling paradigms such as Round Robin, Best Channel Quality Condition and Proportional Fair are commonly adopted...
With the rise the of the Internet of Things (IoT) the Routing Protocol for Low Power and Lossy Networks (RPL) gained a lot of interest in the research community mainly for its flexibility to cope with different network topologies and its ability to offer features like Auto-Configuration, Self-Healing, Loop avoidance and detection, etc. Based on certain routing metrics, RPL's Objective Function (OF)...
In the LTE EPC, many network entities and interfaces have to be maintained and updated regularly. Moreover, to accommodate more users, new hardware must be integrated, although rarely used. To address these challenges, the EPC can be moved to the cloud using two modern technologies: SDN and NFV. In this paper, we study the impact of integrating these novel technologies on LTE networks. We propose...
SIP is amongst the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed its vulnerability to flooding attacks. In this paper, we present a SIP flooding attack detection mechanism that dynamically detects SIP flooding attacks and correlates in real time the temporal characteristics of SIP reliable mechanism and the number of received INVITE requests. Experimental...
In LTE, tracking Areas (TAs) are used to group cells where each cell is assigned to one TA and each user equipment (UE) registers with one TA. A TA may be connected to more than one mobility management entity (MME), which records the current TAs of its UEs. The home subscriber server (HSS) records the current MME for each UE. When a UE moves to a new TA, a TA update procedure is triggered to update...
In wireless sensor networks (WSNs), energy is dissipated mainly when sensors are communicating with sinks. As a result, multiple sinks are deployed in the network in order to increase its coverage area and shorten the communication distance between these two entities. This raises the issue of how best to bind sensors to sinks without overloading any sink. In this paper, we solve the sensor-to-sink...
The popularity of Mobile Ad Hoc networks (MANETs) continues to increase due to the technological advances in wireless radios and wireless networks. Given the unpredictability of the wireless medium, one of the major challenges in MANETs remains to be the efficiency of the underlying routing protocol. The Optimized Link State Routing Protocol (OLSR) is one of the most popular routing protocols being...
A peer-to-peer (P2P) system is known for its scalability and dynamic nature, where nodes can join and leave the system easily and at any time. These networks are susceptible to malicious behavior such as nodes dropping messages and misleading other nodes. P2P routing protocols are not immune against such incidents. Additionally, most secure routing protocols in the literature suffer from false negatives...
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company's financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose...
Accessing remote cloud services usually involves high network latencies. To deal with this issue, several models of local cloudlets have been proposed, but most of which are based on powerful desktop machines running continuously and constantly to provide services to nearby users. In this paper, we propose a more ubiquitous solution based on less powerful but considerably more accessible machines,...
In LTE networks, tracking areas (TAs) design affects the signaling cost of user equipments (UEs) during mobility. Indeed, when the latter are called, the mobility management entity (MME), which records the TA in which the UE is registered, broadcasts a paging message in the UE's TA to determine the exact cell through which the call should be delivered. When a UE moves to a new TA, a TA update might...
A peer-to-peer (P2P) system is known by its scalability and dynamic nature where nodes can join and leave the system easily and anytime. These networks are susceptible to malicious behaviors such as nodes dropping messages and misleading requesting nodes. P2P routing protocols are not immune against these misbehaviors. Therefore, detecting and dealing with malicious nodes will certainly lead to more...
The importance of mobility has influenced the emergence of several mobile computing frameworks, one of which is cloud computing. In this paper, we propose a design for a system that allows mobile users to access discoverable cloudlet servers which can provide them with services and resources on demand. The system involves a cloudlet root server that acts as a directory with which cloudlets register...
SIP is among the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed vulnerability to attacks defined as signaling attacks. These attacks are used to tear down a session or manipulate its parameters. In this paper we present a security mechanism that protects SIP sessions against such attacks. The mechanism uses SIP fingerprint to authenticate messages, in order...
Internet congestion existing solutions such as active queue management algorithms have many shortcomings, mainly related to the detection phase. These algorithms depend on routers' buffer statistics to detect congestion and their performance is highly affected by the environment and the parameters that are used. In this paper we are proposing a mechanism that is capable of detecting congestions by...
At the core of visual testing is the idea that displaying the test failure on the visual artifacts that represent the constituents of a software under test, rather than just describing it textually has the potential of increasing clarity and understanding of the problem amongst a software testing team. This is particularly true and even necessary in a collaborative testing environment which requires...
A wireless sensor network (WSN) is a collection of tiny and limited-capability sensor nodes that report their sensed data to a data collector, referred to as a sink node. WSNs are used in many applications, but are challenged by memory and energy constraints. To address these issues, solutions have been proposed on different levels including the topological level where multiple sinks can be used in...
LTE uses the SC-FDMA radio access technology for its uplink transmission. As a result, resources assigned to the same user must be contiguous in the frequency domain. Several uplink scheduling algorithms were proposed in the literature to fit that constraint. These algorithms take as input a matrix which is used by the Packet Scheduler for an efficient resource allocation. The performance of these...
Wireless Sensor Networks facilitate monitoring physical environments with improved accuracy. Localization has been a major challenge in such networks because without finding the position of the sensor that is reporting sensed data, the reported data will not be useful. In this paper, we survey some of the existing localization techniques and propose a new algorithm for large scale networks that minimizes...
In dense Radio Frequency Identification environments, several readers are placed in the same area to scan a large number of tags covering a wide distance range. The placement of the RFID elements may result in several types of collisions. This paper proposes a new distributed multi-channel algorithm to solve the reader collision problems in dense RFID environments. The proposed algorithm aims at minimizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.