The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Packet integrity or modification attacks commonly happen in Opportunistic Networks (OppNets). In this paper, we propose a technique that uses Merkle trees to protect the integrity of the packets transferred in a network. When adopting the technique in an OppNet, nodes will be able to verify that data transferred from node to node is received unchanged and in its original state. Using a solid trust...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANET (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
In an OpenFlow-based network, the resources arepartitioned in slices. For isolation reasons, each slice has its ownforwarding plane and therefore its own flow table. The searchmemory is so pre-partitioned between the slices. This pre-setmechanism for memory slicing would easily crash the controllerbecause of only one of the slices memory overload. To solvethis problem, we propose, in this paper, a...
The Internet is dramatically evolving and creating various connectivity methodologies. The Internet of Things (IoT) is one of these methodologies which transform current Internet communication to Machine-to-Machine (M2M) basis. The IoT can seamlessly connect the real world and cyberspace via physical objects that are embeded with various types of intelligent sensors. The opportunistic networks are...
In wireless sensor networks (WSNs) energy balancing and energy efficiency are the key requirements to prolong the network lifetime. In this paper, we investigate the problem of energy hole, where sensor nodes located near the sink or in some other parts of the network die very early due to unbalanced load distribution. Moreover, there is a dire need to utilize the energy resource efficiently. For...
Recently, ICN attracts the attention of network researchers. The ICN uses contents name as the ID for recognizing the communication partner instead of the traditional IP network using IP address (terminal location). Nowadays, the NDN which is the one of the network technology realizing the ICN policy, has been proposed. In NDN, routers consisting the backbone network collect the contents recent requested...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.