The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN) simplifies the forwarding devices by introducing a centralized controller. The controller calculates routing rules for the whole network and the forwarding devices cache the routing rules. This working process leads to the new-flow attack. When malicious packets with different headers arrive at the network, they are treated as new flows. These useless flows consume...
Advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have empowered the development of Wireless Body Area Network (WBAN). IEEE 802.15.6 standard, approved in 2012, targets at wireless body area network. The network simulator 2 (NS-2) is a popular and powerful simulation tool, which provides substantial support for simulation...
With the success of wireless technologies and the number of wireless devices increasing, the wireless coverage footprint expands and removes the needs of wired networks for industrial applications. Wireless industrial sensor networks (WISNs) are a type of wireless sensor networks (WSNs), which dedicate to industrial applications. The WISNs bring several advantages over traditional wired industrial...
Security in mobile wireless sensor networks is challenging to achieve, as mobile wireless sensor networks have many different characteristics from wired networks such as lack of center infrastructure, vulnerable wireless links and rapid changes in topologies, etc. However, earlier studies on security issues mainly aim at utilizing cryptography and authentication, which are not only constrained by...
According to the characteristics of driving knowledge, different knowledge expression methods was adopted to express the driving system knowledge respectively, and the driving knowledge expression model has been established. The overall structure and lever of driving knowledge was based on framework representation and the logic judgment process of operation was expressed based on producing representation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.