Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Despite many Internet of Things (IoT) Infrastructures having been implemented in recent years, none of them is truly prepared for a global deployment, where failure tolerance and scalability are an essential requirement. This article presents an alternative concept for IoT Infrastructures, which focuses on enhancing the traditional centralized architecture, usually operated by a single entity, into...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
A Vehicular Cloud generally focuses on several aspects, which include providing a set of computational services at low cost to vehicle drivers; minimizing traffic congestion, accidents, travel time, and environmental pollution; and ensuring the use of low energy and real-time services of software, platforms, and infrastructure with QoS to drivers. The largest challenge in vehicular mobile Clouds consists...
Tactical Edge Networks provide one of the most challenging communication environments. In order to cope with node mobility, constrained resources, and link unreliability, communication solutions designed for Tactical Edge Networks typically present highly configurable interfaces to be adaptable for various networking conditions. However, the extreme dynamicity and heterogeneity of tactical scenarios...
This article deals with Internet of Things as an integration platform for embedded systems. The problem of traditional hierarchical communication is challenged by direct peer-to-peer communication model among various embedded devices. CoAP protocol is selected as a potential candidate to meet that requirements and enable overall integration among embedded systems and Cloud systems. In addition, there...
Research efforts for the Industrial Internet of Things (IIoT) have placed great emphasis on the use of vertical integration as a mainline strategy for the realisation of the fourth industrial revolution (Industrie 4.0). The present paper proposes the use of a distributed Gateway Service Bus (GSB) as a plant-wide and resilient platform for vertical integration, field level reconfiguration, and distributed...
Internet of Things (IoT) has emerged for over a past few years and has been a substantial deployment on multiple architectures, standards, and platforms. Despite the heterogeneity of the devices, it must provide open access for the development of the existing firmware. This firmware must be kept in constant development to remove bugs and improve functionality. An over-the-air firmware update system...
In recent years, there has been an important growth in online gaming. Nowadays, Massively Multiplayer Online Games (MMOGs) may involve millions of synchronous players scattered around the world and engaging with each other within a single shared game. In this paper, we propose a new technique to communicate between players and game server, and between them based on hybrid Peer-to-Peer architecture...
"Let's Share" is an android application developed for the college use which integrates a file sharing system to share several attachments like files(pdf, text, etc) and multimedia files(images, audio and video) in one touch. It also helps the faculty members to inform students about the events that the college is going to organize by sending regular notifications and broadcast campus news...
WebRTC-based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. However, this is not always the case: a WebRTC-based application communicating with a legacy VoIP device or Media Server like a Video Conference Server is also very common. The ability to make both types of communications (WebRTC to WebRTC and...
This paper explores the trust management in the internet of thing. Internet of thing merged up from the concept of wireless technology and the internet. Internet of thing is the direct communication between different heterogeneous things. Here, the things are active participants that interact and communicate with each other as well as the environment i.e. they are self-organized. Since it does not...
Extreme scale computing has no implied scaling limit. The impossibility of implementing reliable communication between crashing hosts prohibits explicit-communication primitives in extreme scale applications. However, the alternatives are not well investigated. This paper reports the development and experimentation of a prototype implicit communication system called AnkaCom using a Statistic Multiplexed...
The Internet of Things is expected to foster billions of heterogeneous sensors and actuators that support a wide range of applications. Maximizing the utilization of these sensors is hinged upon the ability to discover their capabilities (ex: measured attributes, location, accuracy, etc.). This process is known as Service Discovery (SD), and can have a local scope (SD within a bounded area), or a...
Ambient information collected by wireless sensor networks (WSNs) (e.g. space, environment or physiological data) is made available to end-user applications via gateways. In situations where infrastructure-based networks are not available, these gateways and end-user applications are usually implemented as distributed entities forming P2P overlays. Enabling the interconnection of these application...
When multiple nodes share the same gateway or access the same link, the throughput of wireless communications has the unfortunate problem of being limited by traffic congestion; the situation may also further degrade if they establish multiple TCP connections mapped over the same access channel. In end-to- end connections, TCP congestion control plays a critical role in order to not overflow the channel,...
In order to achieve one-to-many data delivery on the internet, native multicast is used and implemented in some parts of the Internet. On the other hand, application layer multicast (ALM), which uses P2P overlays (overlay multicast, OM), can be used to create multicast trees and deliver the data at the application layer. Despite Native Multicast being more efficient than Application Layer Multicast,...
The Internet of Things (IoT) aims at connecting billions of devices in an Internet-like structure. This gigantic information exchange enables new opportunities and new forms of interactions among things and people. A crucial enabler of robust applications and easy smart objects’ deployment is the availability of mechanisms that minimize (ideally, cancel) the need for external human intervention for...
Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and maintenance which also include topology control, i.e., coverage and connectivity. Several sleep-based topology control protocols have been proposed for better performance. While the existing protocols serve their purpose, they still consume high energy. We propose an energy-efficient protocol for Coverage, Connectivity...
Measurements gathered by Smart Meters and collected through the Automatic Metering Infrastructure of Smart Grids can be accessed by numerous external subjects for different purposes, ranging from billing to grid monitoring and management. Therefore, metering data must be securely handled, in order to protect the users' privacy and to prevent the disclosure of personal information through the analysis...
Among the current information security prevention systems such as firewalls and intrusion detection systems, there exist several shortages such as alert overload, high false alarm rate, absence of effective alert management mechanism etc. As a result, there is a tremendous amount of alert data overload in the network, and this data could be redundant, irrelevant or meaningless. The result of this...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.