The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
In the last couple of years Software Defined Network (SDN) have come into existence which empowers network operators with more flexibility to manage and program their network. This type of network solves the limitation of legacy networks. Data plane and control planes are separated from each other as a result data plane devices simple act as a packet forwarding device and leaving the decision making...
Unattended Wireless Sensor Networks (UWSNs) are networks that operate without on-line data collection entities (Sink Collectors). This configuration enriches their flexibility but, at the same time, introduces new security issues. A challenging issue is data survival: in absence of the sink, in fact, data sensed by network sensors cannot be kept clear from the adversary. Cryptographic schemes, moreover,...
The following topics are dealt with: network computing; performance optimization; failure management; cloud services; Web services; security; wireless sensor network; mobile ad hoc network; fault tolerance; overlay network; and telecommunication network routing.
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature...
The following topics are dealt with: interconnection networks; distributed processing; parallel processing; multi-core architectures; distributed systems; intelligent systems; ubiquitous systems; middleware; ubiquitous networking; wireless sensor networks; mobile ad hoc networks; security; service computing; routing; Internet; Web technology; medical document processing; intelligent medical information...
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One...
The following topics were dealt with: wireless sensor networks; MANET; WLAN; IEEE 802.11; MIMO; OFDMA; scheduling; mobility and resource management; Internet; localization; WiMax; coding; OFDM; media streaming; QoS; security; WiMob; cryptographic protocols; ad hoc networks security; broadband wireless access; wireless and mobile computing.
A novel video monitoring system is proposed to provides a more excellent solution for security. The core architecture of this system is constructed by using wireless mesh network (WMN), which has emerged in recent years. WMN is dynamically self-organized and self-configured and can provide better services than other wireless networks. The basic network of this system is divided into two layers: access...
This paper presents principles of meta-design support for end-user development of safe and secure embedded system networking. The presented approach offers a reusable framework for Internet-based embedded system applications. The framework provides a development environment kernel that can be adapted for various safety/security critical embedded system application domains. It stems from the IEEE 1451...
The following topics are dealt with: VLSI; OFDM; embedded systems; filters; MIMO; cellular and integrated systems; media processing; Internet; image processing; network routing; QoS and resource allocation; network management; channel modelling and equalization; ad hoc networks; communication signal processing; WSN; channel estimation; WLAN and WWAN; coding and detection; security; UWB; cognitive...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.