The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
False data injection (FDI) attack is one of the severe attacks that threatens the smart grid's efficiency and reliability. Power grid's status is monitored by many measurement units spread all over the grid; these units periodically send their measurements to the grid's control center (CC), which utilizes them to make the right decisions for the grid. FDI attack inserts fake measurements among the...
Electromagnetic spectrum is a scarce resource. Spectrum licensing is estimated to consume about 20% of cellular operators' capital expenditure (CAPEX). One important measure of spectrum use is “spectral efficiency” (SE), which is the amount of data bandwidth that a specific technology can extract from a certain amount of radio spectrum and is measured in bits per second per Hz (bps/Hz). Using data...
We present an SDN-based orchestration system that enables automated and coordinated arrangement of both computing and network resources in virtualized DC environments. The orchestrator is validated through a set of simulations, as well as through experiments carried out in a real laboratory. Results show that the proposed orchestration system improves the service requests acceptance rate and the utilization...
In Software Defined Networks (SDN), intensive traffic monitoring is used to optimize the Quality-of-Service (QoS) of the network paths which are selected. Thus, we introduce the use of the Cognitive Packet Network (CPN) algorithm to SDN in order to optimize the search for new high-QoS paths. We install the CPN algorithm in the Cognitive Routing Engine (CRE), a new application software for SDN, and...
This paper presents an ultrasound echolocation-based approach for human activity recognition in indoor settings. The key novelty of the proposed approach is to perform activity analysis using distance estimated through “first-reflection echolocation”. The distance to the nearest obstructing object is computed using the first reflected ultrasound signal. All subsequent reflected signal components from...
Resource allocation in multi-operator scenarios requires an estimate of the tenants' traffic needs. This is necessary in the scenario where a Mobile Network Operator (MNO) owns the Radio Access Network (RAN) and many Mobile Virtual Network Operators (MVNOs) act as resellers of their host network's capacity under their own brands, to their own customers. In such scenarios, the forecasted MVNO traffic...
In-home physical therapy is one of the best options for many individuals and families thanks to its convenience and because it makes possible to receive professional care in the comfort of your own home. To enable this therapeutic approach, this paper proposes the employment of a smartphone-centric platform for in-home rehabilitation. The platform helps physicians to monitor the patients remotely...
The demands and interests in non-contact health monitoring have increased rapidly in recent years due to its noninvasive method and easy to use in daily life. In this paper, a real time and non-contact based cardiac monitoring system including a sensor is presented. The sensor is capacitively-coupled with human skin and does not cause impediments in the natural movement of the user. Moreover, low...
In recent years, due to the technological development of various kinds of drones, also known as unmanned aerial vehicles (UAVs), drones have emerged as an effective solution for a wide area of applications. In such applications, employing multiple drones promises a better way to carry out a given mission than employing a single drone. To utilize multiple drones, all drones should establish a network...
Protecting critical files in file systems is very important to computer systems. To protect critical files, the VMI-based Real-time File-system Monitor tools are promising options. However, these tools are always operation-based and introduce high overhead. The operation-based approaches intercept some kind of file operation to monitor critical files. The selected file operation is intercepted by...
Lately, there has been a growing interest in connecting opportunistic routing (OR) and low duty-cycling methodologies in underwater sensor network (UWSNs) applications. This connection improves the data collection reliability and prolongs the network lifetime. When sensor nodes operate in a duty-cycling manner, the properly sleep interval selection and its on-the-fly adjustment should be addressed...
In this paper, we present a fast failover mechanism and a fast switchover mechanism to deal with link failure and congestion problems. In the fast failover mechanism, the controller pre-establishes multiple paths for each source-destination pair in the related OpenFlow-enabled (OF) switches. When a link becomes faulty, OF switches are able to failover the affected flows to another path. Based on the...
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively exploited to generate various cyber threat intelligence related, but not limited to, scanning activities, distributed denial of service attacks and malware identification. However, such data typically contains a...
In Long Term Evolution-Advanced (LTE-A) network, Machine Type Communications (MTC) allows machines to transfer data with almost no human intervention. In MTC, power saving is one of the most important issues. In the meantime, the 3rd Generation Partnership Project (3GPP) proposes Discontinuous Reception (DRX) mechanism to allow user equipments (UEs) to receive data only at specified time slots and...
Wireless sensor networks have become an attractive choice for many monitoring applications in an unattended setups; some of these applications such as pipeline, railroad and highways monitoring require the sensors to be placed in a linear topology. These sensors need to be placed as far apart while still maintaining a minimum required coverage in order to minimize the required node count and reduce...
Wireless Sensor Network (WSN) has recently emerged as a new widely used technology. However, the deployment of such networks has reported high rates of failures. Due to resource constraints of sensor nodes, the design of efficient failure detection techniques has become a very challenging issue. Already proposed WSN fault detection protocols have reported either a high number of false suspicions,...
In this paper, we propose a novel approach to detect a targeted attack by visualizing the paths of lateral movement in which the attacker compromises several hosts in the targeted network step by step to achieve his final goal. To this end, we first identify a pair of hosts that has a relationship in which a host can have compromised the other host based on the suspiciousness of their activities and...
We propose a novel technique for the accommodation of mobile base stations (BSs) and a secondary system with a time division duplex (TDD) frame monitor. By increasing the number of BSs accommodated in a passive optical network (PON), the cost of mobile fronthaul (MFH) can be reduced. To realize even further cost reduction, a secondary system is accommodated in the PON with the MFH while the mobile...
The reliance on the loss-of-signal (LOS) of upstream transmissions to indicate fiber/component failure is potentially unsuitable in networks that implement sleep/doze mode operation. In such networks, the transition into sleep/doze mode would result in no signal transmission, and when used in conjunction with conventional LOS to indicate network failure, would result in erroneous triggering of false...
Barrier coverage is a fundamental application for wireless sensor networks. In this paper, we consider a practical probabilistic sensing model and propose an iterative scheme, called BaCo, to provide strong barrier coverage under this model, with the objective of minimizing the number of active sensors. Moreover, we build the barrier under practical constraints of minimum detection probability and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.