The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network-based URL filtering (NUF) is one of the most widely used tools for detecting and stopping malicious and unwanted web traffic, like preventing children from sex. However, currently the conventional techniques still suffer from high bandwidth consumption due to millions of URL analysis requests to the network servers per day. In this paper, a model of NUF using a novel multi-level counting bloom...
An RFID system generally consists of tags, readers, and backend servers with the readers charged with authenticating/identifying the tags with the help of the servers. Two important enhancements have been suggested for widespread adoption of RFIDs, namely the use of low cost (5?? or less) passive RFID tags and serverless system design to overcome the need for persistent connection between the readers...
Plug-in electric vehicles (PEVs) will not only have a substantial influence on the emerging smart grid system but also create numerous challenges for the utility and customer to deal with their connections and charging. Authentication and authorization processes are critical elements to enable mass deployment of charging stations and to provide authorized customers to access the charging facility...
Methods for transmit power control based on simple long-term channel prediction for the general body-area communications channel are presented. The power control methods are based on large sets of empirical every-day activity data. Numerous transmit-receive pair (Tx-Rx) locations on the human body, i.e. on-body, for a typical body-area-network (BAN) are considered. With the use of a simple prediction...
We present a link capacity estimation model and a hybrid routing scheme for wireless mesh networks which aims at improving throughput. The multi-source interference between links and frame capture behaviors of nodes are analyzed. Our model provides estimated values which can indicate the relative quality of wireless links. And we present a routing metric which combines multiple factors based on the...
6LoWPAN opens a great opportunity for wireless sensor networks (WSNs) to be operated from the Internet. However, 6LoWPAN requires a gateway in order to make the use of IPv6 feasible inside the WSN. In this paper, a gateway is designed and constructed to interconnect 6LoWPAN wireless sensor networks with IPv6 clients, enabling them to receive sensor nodes readings or send commands to the 6LoWPAN WSN...
Wireless/wired hybrid network offers a promising solution to future broadband access. Exploiting the potential of a hybrid network requires an integrated effort on network design and optimization. We discuss the inter-network traffic and intra-network traffic that commonly exist in an access network, and study to improve transmission efficiency for the two types of traffic. We propose a three-step...
The significant growth in the global Internet traffic and routing table size requires solutions to address Internet scalability and resiliency. A number of proposals have considered moving away from the flat legacy Internet routing to a two-level hierarchical routing, separating edge networks from transit carrier networks. In this paper, we study the extended inter-domain traffic engineering capabilities...
Mesh Wireless Local Area Network (WLAN) is a promising access network to enhance channels utilization, extend access coverage with simple and cheap network components. Power management affects mesh WLAN network coverage, topology, throughput, traffic routing and end to end delay. In this paper, power management problem is formulated to show its impact on mesh WLAN network throughput. Then this formulation...
In this paper, we examine the effects of a power saving scheme in Passive Optical Networks (PON). Buffers in network equipment have been a cause of concern since they consume significant power. In a PON, the Optical Network Unit (ONU) buffers client node packets before forwarding to the Optical Line Terminal (OLT). We propose a scheme that reduces or eliminates buffers in the ONU thereby providing...
To support mobility, multihoming, routing scalability, and security, there are a lot of proposals based on ID/Locator split approach not only for the current Internet but also for the future Internet. However, none of them meet the requirements for practical operation such as (1) support of heterogeneity of network layer protocols, (2) scalability of ID/Locator mapping system, (3) independence of...
Today, many kinds of companies with different activities are set around the world. The quantity of information involved therefore has exploded in the sites of information. In the network architecture, information is commonly shipped on mobile sites with potential storage and processing. Several validation protocols were proposed for validating the transactions in the mobile environments. On the one...
In this paper, we elaborate a set of scenarios and experiments for evaluating the impact of the physical environment on a Wireless Sensor Network (WSN). More specifically, a WSN application is implemented for collecting received signal strength indicator (RSSI) measurements in two different environments. The main contributions are twofold: boxplot diagrams are used for graphical comparison of RSSI...
In a multi-network environment, users can receive services via several networks, protocols, and connected devices. These services are usually bound to their specific technology and often limited to a dedicated service provider domain. We are developing a platform overcoming these limitations by enabling information sharing beyond the boundaries of network technologies and services. In this paper,...
In this paper, we consider power control as network layer problem in wireless mesh networks. The network connectivity between nodes is determined by their communication range which in turn can be controlled by adjusting the transmit power level. It is generally acknowledged that reducing transmit power levels of nodes to the minimum required to retain connectivity always increases network capacity...
In networks with very large delay like satellite IP-based networks, standard TCP is unable to correctly grab the available resource. To overcome this problem, Performance Enhancing Proxies (PEPs), which break the end-to-end connection and simulate a receiver close enough to the sender, can be placed before the links with large delay. Although splitting PEPs does not modify the transport protocol at...
We propose and analyze a hierarchical agent-based secure multicast (HASM) algorithm for efficiently supporting secure mobile multicast in wireless mesh networks, with design considerations given to minimize the overall network cost incurred by multicast packet delivery, mobility management, security key management, and group membership maintenance. HASM dynamically maintains a group of multicast agents...
Recently, Shen, Shi, and Waters introduced the notion of predicate privacy, and proposed a scheme that achieves predicate privacy in the symmetric-key settings. In this paper, we propose two schemes. In the first scheme, we extend PEKS to support predicate privacy based on the idea of randomization. To the best of our knowledge, this is the first work that ensures predicate privacy in the public-key...
Today's access networks are increasingly shaped by the services that they provide to the end users. In a hybrid wireless-optical broadband access network (WOBAN), to access any service, the corresponding requests for the services and responses require multi-hop communication over the wireless mesh network (WMN) and Passive Optical Network (PON) subsequently over the Internet to some server in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.