The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an efficient key distribution scheme for sensor networks in which resource constraints and the possibility of node capture and malfunctions are considered. We deal with the problem of efficient routing and key distribution simultaneously. The resulting scheme is scalable and resilient to node captures and malfunctions. Under certain assumptions, the scheme has an upper bound of log2N on...
Peer-to-peer (P2P) systems have drawn a lot of attention from telecom research communities, due to their advantages such as high scalability and cost-effectiveness. Many P2P inspired architectures have been proposed to implement the traditional telecom functionalities such as rendezvous service and even wireless networking. Although DHT is always adopted as the major element of such architectures,...
Today's Internet is facing routing scalability issues, which could degrade network performance seriously. To solve that, several solutions are currently being discussed. Among them, one promising approach is to set up a new architecture which separates the locator and the identifier roles of current IP addresses. A key question for the solution is how to provide an efficient and reliable service for...
A fundamental problem of peer-to-peer (P2P) systems is efficiently locating a node that stores a desired data item. Distributed hash table (DHT) mechanisms have been proposed to address this problem and manage data in very large, structured P2P systems. DHT algorithms provide efficient exact match object search capabilities without requiring global indexing and are hence extremely scalable. However,...
It is commonly recognized that today's Internet routing and addressing system is facing serious scaling problems, which are mainly caused by the overloading of IP address semantics. That is, an IP address represents not only the location but also the identity of a host. To address this problem, several recent schemes propose to replace the IP namespace in today's Internet with a locator namespace...
In the near-future, self-organized networking is expected to become an important component in ITS, and in the Internet architecture in general. An essential challenge concerning the integration of this new component is the accomplishment of scalable and efficient mobile ad hoc routing. This paper overviews considerations relative to the design of such MANET protocols inside the framework provided...
Efficient data management techniques are needed in wireless sensor networks (WSNs) to counteract issues related to limited resources, e.g. energy, memory, bandwidth, as well as limited connectivity. Self-organizing and cooperative algorithms are thought to be the optimal solution to overcome these limitations. On an abstract level, structured peer-to-peer protocols provide O(1) complexity for storing...
Some recent research activities from IETF and IRTF Routing Research Group (RRG) are to explore a new routing and addressing architecture to meet those challenges that current Internet are facing, especially in scalability. An identifier/locator split idea has been widely recognized as an architectural solution to the routing scalability issue. This paper describes a new routing and addressing architecture,...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.