The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We investigate the capability of localizing node failures in communication networks from binary states (normal/failed) of end-to-end paths. Given a set of nodes of interest, uniquely localizing failures within this set requires that different observable path states associate with different node failure events. However, this condition is difficult to test on large networks due to the need to enumerate...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
Trust is the matter of reliance by which one can share information to other for specific task. Trust management gives the schematic survey of trustworthy path selection across mobile ad hoc network. This trustworthiness depends on the reliance of trusted path selection and trust management hierarchy. The trust management is the open area in terms of mobile ad hoc networks, to establish trust across...
In this work, a useful synergy between nano technology and electromagnetic communication among nano sensors using Terahertz Band has been considered. A cluster based routing scheme has been proposed for Body Area Network using wireless channel in Terahertz band to facilitate health care application. The joint impact of shadowing, molecular absorption attenuation and spreading losses have been considered...
Intrusion Detection System (IDS) is considered as one of the most effective security mechanisms in wireless networks. However, nodes which are used to monitor the network abnormal behaviors will carry out amount of overhead and degrade network performance. In this paper, we propose a monitor node selection algorithm based on mutual information to solve the above issue. In the algorithm, we consider...
The consumption of energy in wireless sensor network is an important criterion. The sensor nodes play an important role in wireless sensor networks. The sensor nodes communicate with other nodes within the short distance via wireless medium. The sensor nodes are placed in the static places or Region of Interest (ROI). The sensor nodes are used to sense the desired physical parameters and they send...
Wireless Industrial Automation Networks may comprise large number of sensors and actuators which are densely deployed in various parts of an industry to monitor and control physical parameters like pressure, temperature, humidity, flow, level, density etc.by utilizing IEEE 802.15.4 standard. Typically, a sensor node consists of sensing subsystem for data acquisition, processing subsystem for data...
In collective intelligent robots, communication capability is considered as a key feature to decide how to design the collaboration policy. A cooperative routing robot system is suggested to maintain the communication capability in between human and a robot and an algorithm to establish a seamless global communication is proposed. Generating the radio signal map is suggested to estimate an area where...
Our subject focuses on IPv6 network, which develops for more than 10 years. How IPv6 evolve in those years? Is IPv6 network mature enough to undertake the load produced by users? Can we find some principles to guide IPv6 deployment, which make the whole network more robust and efficiency? This paper tries to answer these questions with in-depth statistics. Good news is that network is growing at a...
BitTorrent is a widely deployed P2P file sharing protocol, extensively used to distribute digital content and soft- ware updates, among others. Recent actions against torrent and tracker repositories have fostered the move towards a fully distributed solution based on a distributed hash table to support both torrent search and tracker implementation. In this paper we present a security study of the...
We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content...
Cryptographic devices are recently implemented with different countermeasures against side channel attacks and fault analysis. Moreover, some usual testing techniques, such as scan chains, are not allowed or restricted for security requirements. In this paper, we analyze the impact that error detecting schemes have on the testability of an implementation of the advanced encryption standard, in particular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.