The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
NEtwork MObility (NEMO) is a host-based mobility management protocol, which efficiently manages Internet connectivity of multiple nodes on the move. Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, tries to offload low-power mobile devices though managing mobility signaling by the infrastructure devices. To support network mobility in PMIPv6-domain, several schemes have been...
With the development of intelligent transport systems (ITS) and vehicular ad hoc network (VANET), vehicular cloud computing (VCC) has been proposed to bring essential and potential benefits, such as improving traffic safety and offering computational services to road users. To make such computational services reliable and secure, the computation results from the vehicular cloud (VC) should be verifiable...
Support of data communication during disaster management operations is traditionally achieved by means of Internet Protocol (IP)-based networks, which however show some limitation in terms of mobility support and resilience to link disruption. A new promising networking paradigm is represented by Information Centric Networking (ICN) architectures implementing caching functions, which are studied in...
Wireless sensor networks are valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for...
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
This paper aims to present a methodology and a set of tools that could be used in order to check the validity of an Intelligent Transport System. These tools will consider each ITS component, i.e. C-ITS- R (Road Side Units) RSU, C-ITS-V (On-Board Unit) OBUU, C-ITS-C (Central Server) with its specific fea- tures as location precision for an OBU and adequate forwarding of dangerous events for an RSU...
Software Defined Networks (SDN) provide a high simplification of the network management by decoupling the control plane from the data plane through the use of controllers. Distributed-Denial-of-Service (DDoS) attacks can make SDN controllers unavailable to process legitimate flow requests from switches. The main approaches to protect controllers against DDoS attacks are essentially based on the attack...
This paper conducts outage analysis for cooperative hybrid automatic repeat request with incremental redundancy (C-HARQ-IR). A general time-correlated Nakagami fading channel including fast fading and Rayleigh fading as special cases is considered. An efficient truncated inverse moment matching method is developed to derive the outage probability in closed- form. The accuracy of the analytical results...
The growing density of cellular users is placing an unprecedented demand on radio spectrum. Cognitive cellular networks can alleviate spectrum demand through dynamic spectrum access. In order to be fully functional, cellular users not only need spectrum access but also require network access. However, a cellular carrier grants network access only to accredited users. In this paper, we focus on the...
To integrate Software Defined Networking (SDN) in the envisioned 5G system, a separation of the control and user data plane functions of the Evolved Packet Core (EPC) is required. This separation will impact mainly the functions available at the Serving GateWay (SGW) and Packet data GateWay (PGW) elements, and will result in two new entities; i.e. the S/PGW-C and S/PGW-U (PGW-C and PGW-U). The S/PGW-C...
Modern cellular networks utilising the long-term evolution (LTE) and the coming 5G set of standards face an ever-increasing demand for low-latency mobile data from connected devices. Header compression is employed to minimise the overhead for IP-based cellular network traffic, thereby decreasing the overall bandwidth usage and, subsequently, transmission delays. We employ machine learning approaches...
Data collection is key issue in vehicular networks since it is vital for supporting many applications in vehicular environments. With the explosive growth of sensing data in urban area, however, strategies for efficient collection of big data in vehicular networks are still far from being well studied. In this paper, we focus on studying this issue and accordingly propose a Software Defined Vehicular...
Cloud computing is expected to keep growing and therefore more and more data centers are being built. In parallel of this increasing amount of data centers, there are also more cloud providers. On one side, this heterogeneity in the cloud market allows a user to choose and change its cloud provider. On the other side, thanks to this growing number of cloud providers, it is now possible to have small...
We demonstrate for the first time an analytical model for computing the end to end packet delay of an Optical/Wireless 60GHz Radio-over-Fiber (RoF) network operating under the Medium-Transparent MAC (MT-MAC) protocol. The model takes into account contention both at the optical and the wireless layer, effectively incorporating the MT-MAC mechanism for seamless and dynamic capacity allocation over both...
In this paper, we study a wireless-powered communication network (WPCN) scenario, in which a multiple antenna amplify-and-forward (AF) two-way relay coordinates power transfer and information exchange to multiple pairs of users. A harvest-then- transmit protocol is assumed where the relay first transmits energy signals to the users in a power transfer phase. Multi-pair of users, which have rechargeable...
This paper presents a novel approach to achieving scalable push multicast services using the distributed global name resolution service associated with emerging name-based network architectures. The proposed named-object multicast (NOMA) scheme employs unique names to identify multicast groups while using the global name resolution service (GNRS) to store the tree structure and maintain current mappings...
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel...
A Vehicular Cloud generally focuses on several aspects, which include providing a set of computational services at low cost to vehicle drivers; minimizing traffic congestion, accidents, travel time, and environmental pollution; and ensuring the use of low energy and real-time services of software, platforms, and infrastructure with QoS to drivers. The largest challenge in vehicular mobile Clouds consists...
The performance of Smart Data Pricing (SDP) highly depends on the accuracy and reliability of measuring network bandwidth usage. The existing Internet protocol uses the distributed control, and the transport network protocols run together inside the routers and switches. However, it is hard to manage and retrieve online and precise measurements from the networks due to the large number of traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.