The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world. This...
TCP is an important communication protocol as more and more multimedia technologies are deployed in the Internet nowadays. However, existing TCP control mechanism has some shortcomings in supporting real-time streaming traffic. Although UDP can be used as an alternative to transmit real-time application data, it lacks congestion control. Introducing a new TCP-friendly protocol that supports the multimedia...
In the business context, accountability has become a major concern for businesses around the world in aftermath of corporate scandals and fallouts. However, accountability has not been rigorously considered in IT system technologies and solutions. The goal of this study is to provide a clear understanding of accountability concept in service-oriented computing and, more generally, e-society. We first...
With the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable environment transaction management technology is believed to provide service reliability and data consistency. Existing models developed for mobile transactions mainly focus on variation of conventional commit procedures and give...
Today IPSec virtual private networks are widely used to establish secure network connections between a pair of hosts, between a pair of security gateways, or between a security gateway and a host. The complexity and variety of rules in an IPSec policy may result in a combination of rules which not only do not provide the required security services, but also compromise the security of communication...
Peer-to-Peer (P2P) file sharing applications have dramatically increased in popularity for the past few years. Although a P2P file sharing network shares many files, it does not usually have a management and control mechanism for the files exchanged. Consequently, copyright infringement and malware propagation in P2P file sharing networks have become prevalent. In order to prevent these file distribution,...
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are designed to address TCP's inefficiency in operating over paths with a high bandwidth-delay product (BDP). To test these new protocols, especially comparatively, and to understand their interactions, extensions to the ns2 simulator allow real code from the linux kernel to be used...
Network device vendors have recently opened up the processing capabilities on their hardware platform to support third-party applications. In this paper, we explore the requirements and overheads associated with co-locating middlebox functionality on such computing resources on networking hardware. In particular, we use an example of TCP acceleration proxy (CHART) that improves throughput over networks...
The steadily growing importance of Internet-based applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multipath Transfer (CMT) is to exploit the existence of multiple paths among endpoints to increase application data throughput. However, handling the congestion control of each path independently lacks of fairness against non-CMT flows...
With the popularity of the Internet, the load on the servers is aggravated heavily, so secret sharing is used as a fundamental approach for improving availability of an online service. In a (t, n)-threshold secret sharing scheme, any t-out-of-n participants could recover the shared secret, and any less than t participants could get nothing about the shared secret. However, with the long life of the...
In wireless sensor networks, the studies that support sink mobility without global position information exploit a Backbone-based Virtual Infrastructure (BVI) to avoid the routing structure construction per each mobile sink by full network flooding. The BVI approach typically considers one-hop clusters and a backbone structure-based tree configured by the cluster heads (CHs). For data dissemination...
This paper describes a testbed scenario deployed over a WiMAX based wireless access network using IKEv2 protocol for authentication purposes. OpenIKEv2 is the chosen implementation of IKEv2, that provides security to wireless communications, but also allows us to use the EAP authentication protocol that lets us reach the main purpose of this testbed: to test the behaviour of recent designed authentication...
Quantum key distribution (QKD) is an emerging technology that provides provable security for point-to-point connections. Its security lies in the fragility of its information carriers, being photons rather than electromagnetic waves. Freespace QKD is particularly interesting, because building optical free-space quantum networks possibly circumvents environmental obstacles that the designers of a cable-based...
During the last years, the growth of e-commerce has been considerable due to the increase of user confidence in secure electronic payment. Most of the security proposals in commerce scenarios have been based on a classical e-payment system definition. This definition basically represents a client who sends a payment order to obtain some goods/services from the merchant. Nevertheless, these definitions...
Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys...
A schedule-based approach, such as TDMA, is more efficient than a Contention-based approach in terms of energy saving by switching sensors into sleeping mode. However it does not use the transmission media effectively as each timeslot is dedicated to a sensor and therefore cannot be used by others should it be idle. Moreover a schedule-based approach requires a central node to manage and broadcast...
Network layer indications are not readily available upon a link change; therefore, general dependence on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current...
The past few years have seen an increasing interest in the development of vehicular ad hoc networks resulting in many routing protocols proposals. Scalability issues in such networks are attracting increasing attention these days. To improve data delivery performance in large scale networks, we propose SIFT, a trajectory based routing scheme that requires sparse infrastructure and rely on low quality...
With the maturation of wireless networks technologies, Telematics service is becoming a new rising and popular network service and application. In this paper, a centralized vehicular Peer-to-Peer Telematics (C-VP2P) service discovery platform is proposed to provide efficient and feasible service discovery. This paper focuses on the issues of developing a Telematics service platform over the vehicular...
A recommendation system enables us to take information from huge datasets about tastes effectively. Many cryptographical protocols for computing privacy-preserving recommendation without leaking the privacy of users are proposed. However, the current issue is the large computational overhead depending the number of users. Hence, the application of the protocol is limited within small communities....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.