The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there has been a huge growth in the world of intelligent devices for home automation. Such gadgets are designed in order to ease the interaction between people and daily home duties. Although individually they are simple to work with, each appliance has its own configuration interface which adds overhead to the general user experience. This paper presents a solution for connecting...
Mathematicians have always been fascinated by the subject of finding the prime numbers of large composite numbers. They have studied various methods and have focused on developing several theories. Nowadays, this problem is of practical importance because the security of the public key cryptosystems depends on the difficulty of factoring public keys. The integer factorization algorithms have rapidly...
The popularity of mobile devices has increased and therefore they have become major targets for attacks, especially the ones that involve stealing private information. On Android, security policies are approved at install time and can't be changed afterwards. This behavior gives the decision power to the developer, although the user should be in charge of what is happening on their device. Users mostly...
The Internet of Things (IoT) integrates a large number of physical objects that are uniquely identified, ubiquitously interconnected and accessible through the Internet. IoT aims to transform any object in the real-world into a computing device that has sensing, communication and control capabilities. There is a growing number of IoT devices and applications and this leads to an increase in the number...
Nowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current commercial antivirus solutions use static signatures for malware detection, which may fail to detect different variants of the same malware and zero‐day...
With the growth in the world of small and intelligent devices, the popularity of custom operating systems has also increased. People need devices that can be easily adapted to their own preferences. This paper presents a solution for building custom software configurations that respond to personal needs. This result is achieved by starting from an operating system with basic functionalities and then...
OSPF is one of the most commonly used interior gateway protocols due to the ability to run between pieces of equipment produced by different vendors and its capacity of splitting the network into areas and fast convergence. In this paper, we propose an approach for setting OSPF weights, using Cisco onePK API, in order to minimize congestion in small networks. It is based on a genetic algorithm, combined...
A large part of the latest research in speech coding algorithms is motivated by the need of obtaining secure military communications, to allow effective operation in a hostile environment. Since the bandwidth of the communication channel is a sensitive problem in military applications, low bit-rate speech compression methods are mostly used. Several speech processing applications such as Mixed Excitation...
Nowadays most hardware configurations are being replaced with software configurations in order to virtualize everything is possible. At this rate, in the networking research domain, the concept of Software Defined Network (SDN) is evolving. This paper proposes an SDN-based security mechanism that provides confidentiality and integrity by using custom cryptographic algorithms between two routers. The...
Link Layer Discovery Protocol (LLDP) and its extension for Media Endpoint Discovery (MED) is a Layer 2 protocol that allows an equipment to advertise its own capabilities. The protocol is robust and reliable and it works in multi-vendor environments, but the main problem is testing, since it requires two physical network equipments to exchange information. The problem gets more complicated when one...
Modern operating systems use mechanisms and instructions implemented in instruction set architectures to perform system calls, which typically involve a context switch from user space (unprivileged mode) to kernel space (privileged mode). By leveraging these mechanisms, we can implement inkernel system calls, which are system calls invoked from kernel space. We present a performance evaluation of...
The popularity and usage of mobile devices have increased and therefore performance demands changed. An important aspect is represented by the whole system stability which has a big impact on general user experience. This paper proposes a solution for improving the implementation process and stability of operating systems for mobile devices. It consists of a system service which collects error messages...
Modern operating system kernels, such as Linux, address the trade-off between portability and performance by exposing a generic interface to user space programs, while maintaining architecture-dependent functionality as a set of separate components inside the kernel space. In particular, performance can only be achieved by ensuring that the architecture-dependent code takes advantage of the facilities...
Nowadays, public-key cryptography is widely used to ensure data protection (privacy, integrity, authentication). Public-key algorithms contain, as an essential part of their construction, the usage of prime numbers and of large composite numbers, which have prime factors. Because of this, the security of these algorithms such as RSA (Rivest-Shamir-Adelman) depend on the difficulty to factorize the...
The past years have shown an increase in the both number and sophistication of cyber-attacks targeting Windows and Linux operating systems. Traditional network security solutions such as firewalls are incapable of detecting and stopping these attacks. In this paper, we describe our distributed firewall solution Distfw and its integration with a sandbox for malware analysis and detection. We demonstrate...
Nowadays, when the whole Internet is service oriented, our main concern is user privacy. Whether we talk about Google, Twitter, Facebook or even plain traffic filtering, we surely can say that our privacy is not their main concern. Luckily there are ways for enforcing our privacy over the Internet. Using Virtual Private Networks that do not keep any personal or accounting information is just one way...
It is always a challenge to keep the state of the network consistent and to be able to say at any moment what packets are getting through it. Software Defined Networking comes in aid and offers an alternative to the old way networking administration is done, offering the administrators the possibility to control the network through a custom written software. In this paper, we propose a solution for...
Recent years have witnessed a constant evolution of mobile systems, from hardware improvements such as multi-core CPUs and virtualization extensions, to a rise in software complexity, including application stores that are the home for millions of mobile applications. This enables and encourages the rising trend of mobile virtualization. In this paper we present an approach for providing lightweight...
Ambient intelligence techniques and smart Internet of Things objects are empowering healthcare professionalsto provide better services based on improved vitalsigns data enriched with contextual information. In this paper, we provide an overview of current solutions and propose a new taxonomy for ambient and health sensor data, based on three selected metrics. The proposed UNCHAIN architecture provides...
Wireless Sensor Networks run critical applications and need to be protected against malicious attacks and faults. In this paper we propose Adaptive Trust Management Protocol, a protocol that adjusts trust and reputation based on node behavior. The protocol includes three phases: the Learning phase, in which experience is computed based on these alerts received from TinyAFD, the Exchanging phase, in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.