The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
In this paper, we propose a Mobile Crowd Sensing application based on Community Information-Centric Networking to collect opportunistic sensing data in limited area where it restricts radius of Bluetooth Low Energy beacon. The application has more valuable features by comparing with common Mobile Crowd Sensing one. First is to support data integrity and utilize simple communication model according...
In the 5G era, radio IP capacity is expected to reach 20 Gbit/s per sector, and ultra-large content traffic will travel across the faster wireless/wireline access network and packet core network. Also massive and mission-critical IoT is the main differentiator of 5G services. These types of real-time and large-bandwidth consuming services require radio latency of less than 1ms, and end-to-end latency...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
Making the data plane of a SDN flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable for Software Defined IoT (SD-IoT) networking. The network device having programmable data plane provides an ability to add new packet and data processing procedures dynamically to the IoT applications. Previously proposed solutions for adding programmability to the...
When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed....
With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities while cyber security threats keep on increase trend. Unfortunately, the current popular security facilities cannot efficiently detect cyber attacks due to a tremendous amount of network traffic needs to be analyzed. In this paper, we focus on DNS...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
Recently, the specifications for 5G system architecture and procedures including TS 23.501 and 23.502 are being developed by 3GPP. In the specifications, one of key principles and concept is to separate the user plane (UP) functions from the control plane (CP) functions, allowing independent scalability, evolution and flexible deployments and modularize the functions design to enable flexible and...
Recently, attempts have been made to change the paradigm of existing plants by applying ICT to the manufacturing industry. It can be seen as an extension of factory automation, which used to automate production facilities and unmanned work in the past, but Smart Factory is an advanced model to predict and respond to the future situation. In this paper, we propose a controller that is optimized for...
Recently, a micro-service architecture has been adopted to an edge device in smart factory due to its maintainability and scalability. In the architecture, all services are generally implemented as Docker containers and deployed by Docker APIs which might be harsh to a factory operator. In this paper, we propose an easy-to-use web-based service deployment method for containerized service to in-factory...
Recently many industries and companies are developing machine learning algorithms and services, and they are publishing them on the internet. However, because most of people who want to use the machine learning services to analyze data are familiar with sheet data rather than programming language, it is difficult to use those services written in programming language. For the reason, we developed a...
As the use of IoT devices is explosively increasing in everyday life, OCF has tried to make a specification to give interoperability between IoT devices. In this paper, we propose a new packet format and a new GATT service definition to support CoAP messages over BLE transmission for the OCF specification. Also, OCF resources in the CoAP packets can be exchanged between OCF devices via BLE-GATT protocol...
Critical Infrastructures such as transportation or energy systems are central to the existence of modern societies. Due to the expected level of performance and developments like the shift towards renewable, fluctuating energy generation in Smart Grids, advanced monitoring and control systems are required for stable operation. This in turn increases the dependence on robust communication technology...
This paper proposes the service discovery and the remote control for Internet-of-Things (IoT) devices based on the Constrained Application Protocol (CoAP) and Domain Name System (DNS). As the number of devices increases, the manual configuration of domain names and services might be unmanageable for users. A legacy DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register the DNS...
As an emerging technology, Mobile Edge Computing (MEC) is introduced to reduce network delay and provide context-aware services. MEC servers are located in close proximity to users, enabling users to seamlessly access services running on edge facilities. However, capacity and bandwidth constraints of MEC servers limit the number of services to be deployed. Therefore, an important problem is how to...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
ATSC 3.0 is well designed based on the concept of all-IP to weave broadcast and broadband together. In order to discover the services or contents delivered through the broadband, ATSC 3.0 defines specific signaling, electronic service guide and automatic content recognition specification. In the case of signaling, the detailed discovering information is provided in the service layer signaling with...
Existing data management and searching system for Internet of Things uses centralized database. For this reason, security vulnerabilities are found in this system which consists of server such as IP spoofing, single point of failure and Sybil attack. This paper proposes data management system is based on blockchain which ensures security by using ECDSA digital signature and SHA-256 hash function....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.