The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emerging Information-Centric Networking (ICN) architectures seek to optimally utilize both bandwidth and storage for efficient content distribution over the network. The Virtual Interest Packet (VIP) framework has been proposed to enable joint design of forwarding, caching, and congestion control strategies within the Named Data Networking (NDN) architecture. While the existing VIP algorithms exhibit...
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
The Internet has become a fundamental platform for virtually all social, economical and security activities in modern societies. Monitoring widespread events on the Internet has many important applications in social trend studies and distributed intrusion/attack detection. This paper studies the problem of distributed joint detection of widespread events observed by the collaborating network devices...
Nanosatellites offer a solution to provide Internet access in areas where there is no ICT infrastructure, such as rural and remote areas, keeping low construction and maintenance costs. A nanosatellite constellation is composed of a certain number of nanosatellites distributed in one or more orbital planes. In most cases, this network cannot ensure an end-to-end connection between sources and destinations,...
With the development of satellite communication technologies and user requirements for pervasive network access, there is a trend to integrate satellites into the terrestrial network infrastructure. Such kind of satellite-terrestrial network is often used for content delivery services as satellites are with wide-area coverage. In terrestrial networks such as Internet, in-network caching has been proved...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
Real-time video communications has been incorporated into many instant communication tools such as ichat, Skype, QQ, etc. Real-time video communications has low delivery delay requirement, which imposes great challenge to the provisioning of such services. To address this problem, in this paper, we propose a selective redundant transmission mechanism to support real-time streaming on multi-interface...
We consider the problem of estimating the latency of a feasible but unused Autonomous System-level path on the Internet. This problem arises in evaluating the overhead incurred by censorship and surveillance circumvention schemes that alter the Internet routing infrastructure, and the cost of attacks against such schemes. Since these paths are not advertised by the current routing infrastructure,...
The performance of Smart Data Pricing (SDP) highly depends on the accuracy and reliability of measuring network bandwidth usage. The existing Internet protocol uses the distributed control, and the transport network protocols run together inside the routers and switches. However, it is hard to manage and retrieve online and precise measurements from the networks due to the large number of traffic...
In this paper, we investigate the flexible power transfer among electric vehicles (EVs) from a cooperation perspective in an energy Internet based EV system. First, we introduce the concept of cooperative EV-to-EV (V2V) charging, which enables active cooperation via charging/discharging operations between EVs as energy consumers and EVs as energy providers. Then, based on the cooperative V2V charging...
The Information-Centric Networking paradigm introduces a largely distributed in-network caching infrastructure. End-to-end routing and forwarding algorithms are no longer the most effective way to retrieve contents when volatile replicas are highly spread at network routers. Requests sent only towards servers that permanently store contents do not account for the possibility to retrieve volatile replicas...
In order to promote the development of the IoT, the Internet Engineering Task Force (IETF) has been developing a standard named Internet Protocol Version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) to enable IP-based devices to connect to the Internet. Besides, to support mobility management, a network-based localized mobility management (NETLMM) protocol named Proxy Mobile IPv6...
Named Data Networking (NDN) ambitions the rank of Future Internet Architecture in uniquely addressing content items by their name. In NDN, routers forward Interests for content after finding Longest-Prefix Matches (LPM) of content names in their Forwarding Information Base (FIB). However, the scalability of this structure is challenged by the huge global Internet namespace. In this paper, we propose...
With constant evolution of the Internet, many of its even well-established properties continue to change. This study re-evaluates the stability and diversity of Internet paths and whether it is affected by the widely deployed Multi-Protocol Label Switching (MPLS). In particular, using traceroutes between large number of source-destination pairs with the Internet Control Message Protocol (ICMP) extensions...
Increase in size and complexity of web pages has challenged the efficiency of HTTP. Recent developments to speed up the web have resulted in two promising protocols, HTTP/2 (RFC 7540) at the application layer and QUIC (multiplexed stream transport over UDP). Google servers are using HTTP/2 and QUIC whereas other major sites like Facebook and Twitter have begun using HTTP/2. In this paper, we compare...
To ensure the low end-to-end (E2E) delay for tactile internet, short frame structures will be used in 5G systems. As such, transmission errors with finite blocklength channel codes should be considered to guarantee the high reliability requirement. In this paper, we study cross-layer transmission optimization for tactile internet, where both queueing delay and transmission delay are accounted for...
The growth of the Internet of Things and the trends to deploy more sensors everywhere has led to search for cost effective ways to connect the devices to the Internet. In the most common network architecture for home IoT, the devices use low-power wireless or WiFi to connect to an AP and access the Internet backend. We present a study on the feasibility and efficiency of an alternate network architecture...
Mobility management in Named Data Networks (NDNs) is one of the main challenges of seamless operation in the future Internet. Techniques used in existing proposals for Consumer mobility are either reactive or semi-proactive, which try to reduce data access time, but yet retransmissions are required. We propose a fully proactive optimal scheme (OpCCMob) that adopts location and data patterns forecasts...
This paper presents a novel method of using Dynamic Soft Descriptor as a fraud prevention method for Merchant (as opposed to card Issuer) in a credit/debit card transaction under Card Not Present (CNP) environment, such as online transactions. A unique identifier is embedded into the transaction descriptor, which will instantly appear in the cardholder's credit/debit card online statement. By checking...
In-network content caching is an inherent capability of Content Centric Networking (CCN) architecture. Undoubtedly, efficient caching strategies can help CCN networks to achieve high performance content dissemination. In general, there are two types of caching strategies: collaborative and non-collaborative caching strategies. Compared with non-collaborative caching strategies, collaborative caching...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.