The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an algorithm to decide on the batch rekeying time for group key management schemes for Internet protocol television (IPTV) systems. Batch rekeying schemes can reduce the effect of membership changes in group key management schemes by collecting and processing several join and leave events at once. Because membership of IPTV systems frequently changes due to the frequent changes...
A feasible architectural framework for the smart grid in home areas is provided based on the latest NIST (National Institute of Standards and Technology, U.S.) smart grid interoperability standards (release 1.0). In this paper, we propose an accountable communication protocol using this architecture with certain reasonable assumptions. Analysis results indicate that our design makes all power loads...
We present DTMon, a dynamic traffic monitoring system using vehicular networks, and analyze its performance in free flow (i.e., non-congested) traffic. DTMon uses roadside infrastructure to gather and report current traffic conditions to traffic management centers and equipped vehicles. We analyze how traffic characteristics such as speed, flow rate, percentage of communicating vehicles, and distance...
As deploying Vehicular Ad Hoc NETworks (VANETs) costs large amounts of resources, it is crucial that governments and companies make a thorough estimation and comparison of the benefits and the costs. The network connectivity is an important factor we should take care of, because it can greatly affect the performance of VANETs and further affect how much we can benefit from VANETs. We use percolation...
Xunlei is a P2P file sharing application that is popular in China. The performance of previous P2P applications is limited by the selfishness of peers and the widely use of firewall. Xunlei applies implicit uploading strategy and firewall bypassing technologies to conquer above drawbacks. To evaluate the effects of above solutions, we perform a series of measurements on Xunlei and BitTorrent networks...
This paper takes into account the uncertainty of the primary users' locations and transmission power in designing an optimal downlink scheduling scheme for cognitive radio cellular networks (CogCells). Localization technique is exploited to estimate the position and transmission power of the primary user (PU) transmitting on specific channel. The objective of our scheduling scheme is to maximize the...
To achieve the desired service quality in IPTV networks, we need effective and resource-efficient error recovery techniques to overcome the problems encountered during the delivery of the IPTV content to the end-users. To enable quick recovery from packet losses, one idea is to utilize an error recovery server (ERServ) that is placed in-between the end-users and the content delivery server. Within...
The performance of the IEEE 802.11 protocol based on the distributed coordination function (DCF) depends on the number of competing terminals. We propose game theory-based extended H∞ filter approach to the problem of estimating the number of competing terminals. The proposed approach has an advantageous feature that the noise information of the dynamic state system and the measurement equation is...
In this paper, we propose novel criterion and novel power control schemes based on the capacity conservation ratio (CCR) by taking the Rayleigh fading effect into account using theoretical analysis. The CCR is defined as the ratio of the decreased capacity in the spectrum sharing to the original capacity of a system. We utilize the CCR as a novel metric for protecting a primary system (PS) from large...
We describe our experiences implementing the master-key recovery attack against the High-Bandwidth Digital Content Protection Protocol (HDCP). We recovered the private keys from 41 HDCP-capable monitors using the key extraction attack of Irwin. We then used the master-key recovery attack of Crosby, et al. to compute the HDCP global secret. The attack used commodity hardware and did not damage the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.