The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
Quantum key distribution (QKD) enables two authenticated parties to share secret keys with the ability to detect any attempts to eavesdrop the keys theoretically. Currently, QKD systems can be categorized by its source of uncertainty in nature; single photon or coherent light. As coherent light is harnessed, the overall cost for composing systems drops in general. However, more elaborate post processing...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
This paper designs a new leader-following consensus protocol for second-order multiagent systems with time-varying sampling. For the first time in designing a leader-following protocol, the concept of betweenness centrality is adopted to analyze the information flow in the consensus problem for multiagent systems. By construction of a suitable Lyapunov–Krasovskii functional, some criteria for designing...
In this paper, we implemented OpenFlow scheduled bundle in the Open vSwitch software switch and evaluated its performance in SDN testbed networks under different scenarios. The scheduled bundle is a very new mechanism proposed in the OpenFlow protocol for achieving consistent updates among multiple SDN switches. However, this feature has not been supported in any hardware SDN switches or any software...
Nanotechnology becomes reality paving the way for many new applications. In nanonetwork system, each nanosized device is equipped with limited capabilities and is dedicated to a basic task but the combination of the numerous devices actions results in high-level functions. In this context, large number of devices concentrated in a limited area must exchange data using wireless links. Spread in Time...
Ethernet plays an important role in the layer 2 network. Unfortunately, the tremendous Address Resolution Protocol (ARP) broadcast traffic among massive hosts limits the scale of Ethernet. Recently, Software-Defined Network (SDN) has been proposed to suppress broadcast traffic by centralized control. However, existing approaches based on SDN suffer from an adaptability limitation as they cannot independently...
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are catching the attention of telecom operators. Telecom environments establish a set of Carrier Grade requirements such as high availability, high throughput and low latency. To address these challenges SDN deploys logically-centralized controllers, such as ONOS and OpenDayLight. Based on the JAIN SLEE component model, which...
Software-defined networks (SDN) are vulnerable to most of the attacks that traditional networks are vulnerable to. In addition, SDN has introduced new vulnerabilities through its unique architecture such as those related to the southbound and northbound controller interfaces. In this paper, we introduce a lightweight flow-based Intrusion Detection System (IDS) that periodically gathers statistical...
Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification...
In this paper, we propose the China-US international data placement laboratory (iDPL) based on an inter-continental testbed for data placement research. iDPL is able to support various data placement research due to its scalability and flexibility in deploying the experiments in the real network environment. The core design of iDPL leverages reliable workflow management and lightweight I/O protocol...
Combining data analytics with homomorphic encryption is an interesting topic, which finds several applications in the healthcare domain because it enables clients with low computational and/or storage capacity to outsource the analysis of potentially large datasets to the cloud while protecting sensitive data from unwanted access. In this work, we propose a framework for evaluating k-means clustering...
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as...
Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To...
Recent results show that slotless, purely-interval based neighbor discovery protocols, in which time is assumed to be continuous, achieve significantly lower worst-case discovery latencies than time-slotted protocols. In slotted protocols, the discovery of device A by B and vice-versa occurs within the same slot, and hence the latencies for one-way and two-way discovery are identical.However, in purely...
The process of two wireless devices meeting over-the-air for the first time is referred to as neighbor discovery. In mobile ad-hoc networks, battery powered devices duty-cycle their radios during neighbor discovery. As a result, they transmit and receive for very short durations of time and sleep at other times.Energy-efficient protocols, which guarantee short, bounded latencies while achieving low...
We have proposed a distributed storage system which dynamically makes storage tiers and optimizes location of data blocks autonomously. This aims to enhance the I/O performance of the storage system without remarkable network overhead. Our system dynamically organizes storage tiers considering device characteristics. And the data blocks will be placed in a suitable storage tier according to their...
In this paper a data acquisition system based on wireless sensor networks to support the biomechanical gait analysis will be presented. The system is composed by sensor nodes that can be fasten to the limbs of a person. Each node contains the ESP8266 platform connected to a MPU6050 module that includes a gyroscope and an accelerometer. The system starts working in a self-adjusting (auto calibration)...
The work proposes and justifies a processing algorithm of computer security incidents based on the author's signatures of cyberattacks. Attention is also paid to the design pattern SOPKA based on the Russian ViPNet technology. Recommendations are made regarding the establishment of the corporate segment SOPKA, which meets the requirements of Presidential Decree of January 15, 2013 number 31c “On the...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.