The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network security has become a major concern in recent years. In this research, we present an entropy-based network traffic profiling scheme for detecting security attacks. The proposed scheme consists of two stages. The purpose of the first stage is to systematically construct the probability distribution of relative uncertainty for normal network traffic behavior. In the second stage, we use the...
Carrier sense multiple access with collision avoidance (CSMA/CA) is one of the basic media access control (MAC) protocols specified in the IEEE 802.11 to support many stations to share a channel in the network. This paper analyzes how the performance of CSMA/CA is affected by the back-off time. We propose to use random back-off time and simulation results show that it can achieve better performance...
The push-type packet compensation protocol using the random slot/code selection method have been proposed and evaluated in the synchronous case. However, it is difficult to synchronize between all users. In this paper, the push-type packet compensation protocol using the random slot/code selection method is evaluated by the computer simulation in the asynchronous case. As the results, the random slot/code...
Wireless sensor networks have become very useful in so many applications. Applications such as grape monitoring, insect movement monitoring and etc., that allows connectivity between sensor network and Internet can solve many remote control and monitoring problems. IPv6 over low power WPAN (6lowPAN) protocols are suitable technology that can be adapted in wireless sensor network. The deployment of...
E-mail systems are some of the most admired Internet-based applications today. They enable users to send and receive e-mail messages between each other both from inside and outside the local area network. The simple mail transfer protocol (SMTP) is a transportation protocol used to transfer Email messages over the Internet. When the e-mail server sends email messages among each other or from the clients...
The key requirement of 200 Mbps MB-OFDM UWB wireless system is that the OFDM block which is a 128 point FFT/IFFT processor has to operate at 528 MHz. The same way, a 64 state, rate-1/3 Viterbi decoder block is needed but this has to operate at 125 MHz. Novel schemes are essential for achieving these speeds on FPGAs. In this paper, novel schemes are proposed to meet the challenges of FPGA based OFDM...
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations...
Complexity of design and the lack of suitable test methodology are the major obstacles for widespread use of asynchronous circuit in digital circuit design. Template based synthesis of asynchronous circuits is accepted as an effective way to decrease the complexity of design. However, test frameworks such as fault simulator for synchronous circuits are not applicable for template based asynchronous...
To provide personal services in a ubiquitous environment, it is necessary to identify users without giving a psychological pressure to them. This paper proposes a configuration of the sensor network used to identify a user based on his or her sole pressure distribution on a sensor mat that uses a hetero-core optical fiber. Specifically, it presents a filtering algorithm used to determine the pressure...
A new ultra-high frequency radio frequency identification (UHF RFID) reader which baseband module is based on ARM processor and FPGA chip has been designed and implemented to satisfy EPC Class-1 Generation 2 protocol. The reader consists of three parts: baseband signal processing board, radio frequency transceiver and interface board. 90 degree phase-shift microstrip line is used in the radio-frequency...
This paper studies what is the right relay protocol strategy for a low density parity check (LDPC) cooperative diversity scheme. In this scheme, an improved maximum likelihood detection (MLD) featuring Log-likelihood (LLR) combining technique is also introduced. A basic cooperative diversity scheme of a source node (S), a relay node (R) and a common destination node (D) is considered. This scheme...
Counter-example guided abstraction refinement (CEGAR) techniques have been primarily used to scale the capacity of formal property verification. This paper explores the utility of CEGAR for verifying an emerging style of formal specifications, called AuxSM+properties, which consists of auxiliary state machines (AuxSMs) and formal properties based on the AuxSMs. A core challenge in formally verifying...
Many network management stations are designed statically to accomplish a set of defined functions taken from object IDs. As the implemented MIB objects for under-development WiMAX tend to grow, redesigning a deployed network manager would occur many times. Therefore, providing a more generalized and customizable network manager would become an alternative solution. In this paper, we design a customizable...
Early detection techniques of scanning worms are based on simple observations of high port/address scanning rates of malicious hosts. Such approaches are not able to detect stealthy scanners and can be easily evaded once the threshold of scanning rate for generating alerts is known to the attackers. To overcome this problem, sequential hypothesis testing was developed as an alternative detection technique...
Multi-cipher and multi-mode cryptosystems are widely used for hardware acceleration in modern security protocols. In a session of communication, these protocols can only use an algorithm along with its operation mode. The switching of cipher algorithms and operation modes can occur between sessions of communication. This paper introduces a multi-cipher cryptosystem (MCC) which enables a cryptosystem...
The creation of efficient and secure framework is becoming important with the rapid development of internet and World Wide Web (WWW). The objective of this paper is to examine the web based framework to retain the information of any organization. Thus, we propose a new scaffold on the basis of JSP Access Model and Model-View-Controller (MVC), which will assist in providing information regarding users...
This paper presents an intrinsically verifiable library of quasi delay insensitive asynchronous templates providing an efficient debugging platform for large asynchronous circuits. We proposed using state transition graph to determining necessary properties which must be checked. For every template of a pre-charged full buffer library, we defined PSL properties which are used as monitors verifying...
We describe the implementation and evaluation of a network simulator 2 (NS-2) module for the datagram congestion control protocol, or DCCP. Our module, based on an updated standard described in RFC 4340, attempts to model the behavior and performance of the two currently defined congestion control identifiers CCID2 and CCID3. The behavior, throughput, and fairness of DCCP in comparison with TCP were...
Secure communications in the context of civil space missions gained a major attention in the last few years, several research groups and international organizations are currently developing the required security mechanisms, based on widely used protocols of the Consultative Committee for Space Data Systems (CCSDS) Packet TM and TC family. However, given the hostile space communication environment,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.