The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
This paper examines the detection properties of obfuscated network buffer overflow attacks by selected IDS and NBA. The obfuscation was performed by tunneling the malicious traffic in HTTP and HTTPS protocols with the intention of simulating the usual legitimate characteristics of the HTTP traffic's flow. The buffer overflow vulnerabilities of four services were used: Samba, BadBlue, Apache, DCOM...
This paper establishes a stochastic activity network model for P2P file-sharing, to evaluate the quality of service provided. Key characteristics taken into account include the reputation scheme applied, the number of peers, fraction of malicious peers, peer churn and end-users' behavior. The results show that reputation schemes influence the quality of service significantly. Based on the findings,...
Long-Term Evolution (LTE) is the next-generation network beyond 3G. Authentication service is one of the most essential services in LTE networks, which has significant effects on internet security. In this paper, we survey and compare three authentication protocols: Password Authentication Protocol, Lightweight Extensible Authentication Protocol, and Extensive Authentication Protocol-Transport Layer...
Similar to conventional NAT technology, NAT-PT gateways break traditional TCP/IP's end-to-end argument property which result in IPSec can not be applied in NAT-PT environment, and would fall flat when the pool of IPv4 addresses is exhausted. A solution by adding IP transform message, modifying the address mapping tables and session tables, using port transform strategy with inner host computer character...
The cache-and-forward (CNF) architecture has recently been proposed as a "clean-slate" solution for efficient content delivery in the future Internet. The CNF architecture is based on the concept of hop-by-hop transport and in-network storage of content. In this paper, we investigate a gateway centric method for efficient content caching and routing in the CNF network. In this method, a...
In the last few years, SMS (short message service) has made a big impact on the way we communicate. Instead of communicating over the phone using voice, people rather prefer SMS not only for messaging but also for information exchange. This paper proposes a method of building an extendable generic application which can be used to provide various types of information services using mobile SMS. Mobile...
This paper proposes a novel method to characterize Internet email traffic. We apply our mechanism to two different volumes of email traffic data captured respectively near an email gateway of a small company and at a country-edged core router of a large commercial Internet service provider in China. Experiment results show that there are significant abnormal email traffic in both the backbone link...
The wireless sensor networks (WSN) with their constant evolution, need new management methods to be monitored efficiently by taking into account their constraints such as energy consumption, reliability and remote monitoring. Note that WSN has diverse application domains: smart home, smart care, environmental data collection etc. In order to manage a large scale WSN, some wireless sensor network management...
IP Multimedia Subsystem (IMS) has been widely accepted by telecom industry as the development trend for providing next generation telecom services. However, IMS application layer hasn't been well structured yet and most of the telecom services are still developed in silo method which limits new service implementation pace. In this article, we intend to present an alternative approach for service creation,...
A gateway-oriented password-based authenticated key exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy against the server, and password guessing attacks resistance...
Lately solutions for remote access for residential services have been proposed. However, these solutions require modifications to the service controllers. In addition, remote access adds complexity to the client application. We propose here a solution for decoupling remote access from the client itself with an entity that creates virtual instances of remote services in a local network. Thereby, clients...
Softswitching is a significant technology of the Next-Generation Network, but it can't be widely used if there isn't a provisioning system supporting it. The workflow-based Softswitching provisioning system in this paper helps engineers working together even they are not in the same location, and provides an easier way to configure the devices quickly and correctly. It not only improves efficiency...
In this paper, we report our experience in working with network address translators (NATs). Traditionally, there were only 4 types of NATs. For each type, the (im)possibility of traversal is well-known. Recently, the NAT community has provided a deeper dissection of NAT behaviors resulting into at least 27 types and documented the (im)possibility of traversal for some types. There are, however, two...
In recent years, the technology of cloud computing has been widely applied in e-business, e-education and etc.. Cloud computing platform is a set of scalable large-scale data server clusters, it provide computing and storage services to customers. The cloud storage is a relatively basic and widely applied service which can provide users with stable, massive data storage space. Our research shows that...
For IPv6 and IPv4 network seamless interconnection question, it is very essential to study IPv4/IPv6 intercommunication technology to ensure smooth transition of IPv4 to IPv6. To solve the seamless interconnection question, this article mainly researches IPv4 to IPv6 development's intercommunication question of three stages, including IPv6 based-IPv4 network interconnection, IPv4/IPv6 transparent...
Service-oriented computing defines a services application as an assembly of loosely coupled software elements: services. Today, SOC is very technology-driven. Engineers have to deal with numerous technologies for describing, publishing services and creating and manipulating services applications. In particular, deploying services applications is a complex task, reserved for experts. By deploying,...
With the growing number of mega services and cloud computing platforms, many industrial organizations are building distributed data centers and are populating them at increasing rates. At the same time, the field of complex event processing(CEP) is gaining popularity as its value is realized for real-time monitoring of these large distributed systems. Traditionally, the CEP system and core event passing...
Advancements in the MEMS technology, improved deployment strategies and sensor Web enablement standards, have facilitated the realisation of pervasive and ubiquitous computing through more and more sensor networks. Research community is straining hard to establish world wide sensor networks that may provide functionalities similar to those available through Internet and World Wide Web. A serious look...
In this study, we consider an optimization problem concerning about how to build a multicast tree to deliver continuous multimedia streams to a large number of mesh clients on the wireless mesh networks simultaneously. In order to provide high-quality streams to users, we need to allocate non-overlapping channels to communication links to avoid interference. Since the number of non-overlapping channels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.