The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the secrecy performance of a full-duplex relaying (FDR) system with a full-duplex (FD) receiver. A novel cooperative jamming protocol is proposed to improve physical layer security, where the FD receiver sends interference to the eavesdropper to degrade its received signal-to-noise ratio when receiving signals from the relay and the source. Taking the residual self-interference...
REST architectural style has become a prevalent choice for distributed resources, such as the northbound API of software-defined networking (SDN). As services often undergo frequent changes and updates, the corresponding REST APIs need to change and update accordingly. To allow REST APIs to change and evolve without breaking its clients, a REST API can be designed to facilitate hypertext-driven navigation...
Byzantine fault is the fault that can make the components behave arbitrary and may cause disastrous results. With the increasing malicious attacks and software errors, Byzantine fault tolerance has begun to draw more attention it deserves. Previous Byzantine fault tolerant algorithms have strong assumption that all the replicas is synchronous and do not support replicated calling services, which make...
Fingerprint biometric is one of the most successful biometrics applied in both forensic law enforcement and security applications. Recent developments in fingerprint acquisition technology have resulted in touchless live scan devices that generate 3D representation of fingerprints, and thus can overcome the deformation and smearing problems caused by conventional contact-based acquisition techniques...
In this paper, we present a REST Chart based approach to design and implement RESTful northbound API in SDN. In our approach, the RESTful API is modeled with Petri Net, and REST constraints, such as hypermedia driven, are enforced naturally. The RESTful structure of the designed northbound API can be checked almost automatically based on the described REST Chart model. The proposed approach has been...
As wearable fitness trackers gain widespread acceptance among the general population, there is a concomitant need to ensure that associated privacy and security vulnerabilities are kept to a minimum. We discuss potential vulnerabilities of these trackers, in general, and specific vulnerabilities in one such tracker — Fitbit — identified by Rahman et al. (2013) who then proposed means to address identified...
Recently, Hadoop Distributed File System (HDFS) has been widely used to manage the large-scale data due to its high scalability. HDFS can natively support sequential queries, which are the most common queries in the applications. However, there still exist many applications that need to apply random queries of large-scale data. So the random queries in large-scale data are becoming more and more important...
A Byzantine Fault Tolerant Algorithm suiting web services is proposed considering the features of web services. There are significant differences between the algorithm and the Castro and Liskov's well-known practical Byzantine fault tolerance method. First, we have to create replicas on both sides of communicating web services, while in CLBFT's method, replicas are created only on the server side...
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in Alibaba, is driven by observations of specific application workloads, internal demands and technological environment. In such systems, the metadata service is a critical factor that can...
Among RFID authentication protocols, HB and its variants have received widespread attention due to their strength based on the underlying LPN problem. Several variations of HB exists in extant literature, each improving on previously proposed protocols. We use the iterative nature of the HB-family of protocols to develop a means to identify the presence of an RFID tag with the knowledge of the presence...
This paper presents a Byzantine fault tolerant protocol for composite Web Services. We extend Castro and Liskov's well-known practical Byzantine fault tolerance method for the server client model and Tadashi Araragi's method for the agent system to a method for the composite Web Services. Different from other Byzantine tolerant methods for single web service, in composite Web Services we have to create...
Current advances in portable devices, wireless technologies have created a mobile computing environment which is characterized by a large scale of dynamism. But mobile computing is quite different from traditional middleware while addressing the dynamic and pervasive aspects of mobile systems. This paper represents the experience of our project related to next generation middleware systems, with high...
Underwater wireless sensor network is a novel type of underwater networked system. Due to the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious attacks. The existing security solutions proposed for WSN cannot be used directly in UWSN. Moreover, most of these solutions are layer wise. In this paper, we studied the threat, attack, and security issues of UWSN. Subsequently,...
When the crypto-period is expired or the key is compromised, trusted third party (TTP) broadcasts the materials of key update. The method cannot guarantee that all the nodes access to key materials in time if nodes work on different spectrums in cognitive radio networks. This paper presents a new algorithm based on the logistic model (KULCR) which reduces the demand for network synchronization and...
As RFID tags become popular, their volume in both the number of applications and the sheer number per application is bound to increase. This increase in density of RFID tags at any given location invariably results in collision problems that occur when a reader tries to simultaneously read multiple tags that are present in its field. The Slotted ALOHA protocol and its variants have been used over...
A scheme of constructing shipping monitoring and control system has been provided: consists of monitor and control center, data communications, ship-borne terminals and user terminals; Hardware Structure of ship-borne terminal has been discussed: consists of central processing unit, GPS module, GPRS module, memory modules, I/O interfaces, keyboard and display modules etc. And the overall structure...
Controller Area Network has been widely used as an embedded field bus in real-time industry systems, in particular, for automotive digital communications. However, with the increasing criticality of automotive control systems (e.g. advanced driver assistance systems), automotive communication systems are required to support more dependable and flexible communication services. Upcoming car series will...
Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where...
Relay attacks occur when an adversary simply relays signals between honest reader and tag without modifying it in any way. Since the signal content is not modified by the adversary, none of the extant cryptographic protocols are immune to such attacks. There have been several proposed protocols that purport to alleviate this problem for a single tag. We propose a protocol that considers relay attacks...
A resolution of Distributed Data Acquisition System for the use of E-Commerce is discussed in this paper. The scheme of this resolution is illustrated and relative features are presented. The hardware realization of Ethernet communication by using TMS320C5409 DSP controlling net chip 8019 AS was introduced. The data transition was based on UDP and the method and announcement was discussed in detail...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.