The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a timing-only based attack against encrypted and padded web traffic. The attacker can collect training data, but only over a different connection from that against which the attack is directed. This is a significantly easier to perform attack than one which depends on training data collected over the victim link. We demonstrate that an attacker can infer the correct web page >87% of...
In the process of satellite network communication service transmission and distribution, due to the limitation of the system cache space can cause the congestion effect, it easily lose the data of high importance or timeliness. Aiming at the problem of network congestion effect, based on RED (Random Early Detection) algorithm, M_TSPAQM(Queue Manage Algorithm Based on Priority of Multiple Terminal...
Sharing channel capacity among multi-rate sensors or synonymously packing the bandwidth while satisfying quality of service requirements stays as an important challenge. We present bio-inspired solutions to this problem by reducing it to the NP-hard multiple-choice knapsack problem. We employ various bio-inspired population-based meta-heuristics to allocate capacity to the requesting nodes in a sensor...
A rapidly deployable and cost-effective railroad crossing early warning system integrated with the railway system is attractive due to its protection of the unmanned grade crossings, which requires a warning system with long-distance communication link. In this paper, we investigate the problem of suitable antenna selection for such a railway warning system First, the antenna criteria for railroad...
The goal of this paper is to explore the evolution of Heterogeneous Networks (HetN ets) and their move towards SG in robust high speed mobile wireless networks. The recent advent of SG provides concepts for low-latency and high capacity network solutions that can be integrated into fast moving architectures. However, the challenges in deploying and utilizing the conventional HetNets have led to new...
This paper presents a method of device type verification via network behavior examination. This work is compared to methods and applications like nMap or xProbe, because it is capable of discerning mobile operating systems (OS) by using both active and passive network traffic. Our approach, which is based on repeatable experiments, suggests that the three major mobile OS vendors (i.e., Android, iOS,...
Recent developments in the area of Wireless sensor networks and Mobile ad hoc networks provide tlexible and easy-to-deploy communication means for a wide range of applications without any need for an infrastructure being pre-configured. Our paper studies performance of proactive and reactive routing protocols in a scenario with agro-sensors. Our results, achieved by simulating a network both in OPNET...
Vehicular ad hoc networks (VANETs) are designed to provide traffic safety by exploiting the inter-vehicular communications. Vehicles build awareness of traffic in their surroundings using information broadcast by other vehicles, such as speed, location and heading, to proactively avoid collisions. The effectiveness of these VANET traffic safety applications is particularly dependent on the accuracy...
Today, due to the popularity and convenience of wireless communications, people communicate with others by using mobile phones almost every day, as one of their important daily activities. Currently, LTE-4G is the mainstream of mobile communication. Recent studies on the upcoming LTE-5G wireless environments employ AES to protect delivered messages. However, using this cryptography standard to encrypt/decrypt...
Some public and private services are called part of the Critical Infrastructure (CI), which are considered as the most important services to protect the functioning of a society and the economy. Many CIs provide services via the Internet and thus cyber-attacks can be performed remotely. It is now very simple and free to find and download software, which automates performing cyber-attacks. A recent...
Because mobile users demand high quality and energy-friendly video delivery service that efficiently uses wireless resources, we introduce a green video delivery system using moving route navigation and playout buffer control based on the mobile throughput history data. Our system first determines the optimal travel route to realize high-speed and energy-efficient communications. Then when a user...
Work-related stress is normal and at low levels, it can actually increase productivity. However, high levels of stress can lead to a decrease in performance at work and can also cause adverse effects to health. High stress has been associated with cardiovascular diseases, sleep deprivation and anxiety disorder. Because of this, it is important to be able to cope with stress everyday to reduce its...
This paper presents a method of increasing the secrecy capactty utilizing the channel diversity technique in wireless communication. In general, a relatively higher secrecy capactty can be achieved at the intended receiver by deploying channel diversity to mitigate the effect of low signal to noise ratio. In this analysis, the legitimate receiver and the eavesdropper are assumed to employ maximal...
Smart devices have already become a dally necessity of our life since they play a pivot role to record massive amount of Information of our personal life. Current Internet of TWngs era has been seeing more and more people relying on their devices. However, most people are losing patience to set complex passwords to ensure the security for their devices. To avoid forgetting the passwords, people are...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive attacks...
Wireless Sensor Networks (WSN) have been highly developed which can be used in agriculture to enable optimal irrigation scheduling. Since there is an absence of widely used available methods to support effective agriculture practice in different weather conditions, WSN technology can be used to optimise irrigation in the crop fields. This paper presents architecture of an irrigation system by incorporating...
There are continuous hacking and social issues regarding APT (Advanced Persistent Threat - APT) attacks and a number of antivirus businesses and researchers are making efforts to analyze such APT attacks in order to prevent or cope with APT attacks, some host PC security technologies such as firewalls and intrusion detection systems are used. Therefore, in this study, malignant behavior patterns were...
Internet of Things (IoTs) is an enabler for the intelligence appended to many central features of the modern world, such as hospitals, cities, grids, organizations, and buildings. The security and privacy are some of the major issues that prevent the wide adoption of IoTs. Its storage and computing power of these devices is often limited and their designs currently focus on ensuring functionality...
Dynamic Adaptive Streaming over HTTP (DASH) is a standard for media streaming that has been largely adopted, as it allows improved quality of experience (QoE) and the streaming host only needs to adopt conventional web server infrastructure. Despite DASH's feasibility for enhancing QoE, mobile devices are constrained by battery capacity, and video streaming can be a major source of energy consumption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.