The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterisation...
Many common DTN routing protocols are replication-based, which have relatively good performance in terms of message delivery ratio but high overhead, and leave the issue of garbage collection open. In this paper, we propose Named Data Distance Routing (NDDR), a named data based DTN routing approach which makes routing decisions for named data based on topological distance information. This helps to...
Mobile Ad hoc Network has a wide range of applications in military and civilian domains. It is generally assumed that the nodes are trustworthy and cooperative in routing protocols of MANETs viz. AODV, DSR etc. This assumption makes wireless ad hoc network more prone to interception and manipulation which further open possibilities of various types of Denial of Service (DoS) attacks. In order to mitigate...
The advance of technology in wireless sensor networks is increased nowadays. In this network, minimizing the battery consumption is most enormous challenge. For reliable data transmission, effective routing is required. In this work, an efficient node infirmity tracking scheme with stable supportive route for reliable data transmission is proposed. Problem Statement: Sensor nodes sense the data and...
In the area of biomedical engineering, digital-microfluidic biochips (DMFBs) have received considerable attention, because of their capability of providing an efficient and reliable platform for conducting point-of-care clinical diagnostics. System reliability, in turn, mandates error-recoverability while implementing biochemical assays on-chip for medical applications. Unfortunately, the technology...
The rapid development in communication approach has brought out new mode of communication. Among the recent developments, adhoc network has emerged as new mode of data communication. The objective of link reliability is a major concern in such network. In this paper, a new approach to route discovery based on network power and operational characteristic is proposed. The approach suggested, results...
SpaceWire is a full-duplex, point-to-point, high-speed serial data transfer standard which is intended for use in further on-board spacecraft, space missions and applications. However, space environment is harsh and complex which requires a communication network with high reliability. It is inevitable that SpaceWire network link fault or SpaceWire equipment damage is able to change the SpaceWire network...
Underwater Acoustic Networks (UANs) are widely used in various applications such as climate change monitoring, pollution control and tracking, tactical surveillance and offshore exploration. However, limited consideration is given to the security of such networks, despite the fact that the unique characteristics of UANs make these networks vulnerable to various malicious attacks. In this paper, we...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase the security and resilience of communication infrastructures. Despite their clear advantages, such solutions also expose ICS to common cyber threats that may have a dramatic impact on the functioning of critical infrastructures,...
Trust is the matter of reliance by which one can share information to other for specific task. Trust management gives the schematic survey of trustworthy path selection across mobile ad hoc network. This trustworthiness depends on the reliance of trusted path selection and trust management hierarchy. The trust management is the open area in terms of mobile ad hoc networks, to establish trust across...
Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of constructing a shortest path overhearing tree with the maximum lifetime. We propose three approaches. The first one is a polynomial-time heuristic. The second one uses ILP (Integer Linear Programming) to iteratively find a monitoring...
Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end...
The goal of this paper is to introduce two trust methods for routing in wireless sensor networks. The two methods consider transitivity of trust. When computing routing trust value, we use optimistic and pessimistic ways respectively. These trust methods can select a trust routing for precise data transmission. Simulations for optimistic method show the trust model has a higher performance than ECCR...
Sensor network is an adaptable technology for perceiving environmental criterions and hence finds its pivotal role in a wide range of applications. The applications range from mission critical like military or patient monitoring systems to home surveillance systems where the network may be prone to security attacks. The network is vulnerable to attack as it may be deployed in hostile environments...
This paper presents a novel security monitoring system of mine based on power line communication; with networking and routing technology, an artificial cobweb routing of security monitoring communication system is established to ensure the reliability of data communication in the system, and improve the reliability and validity of the PLC-based security monitoring system. This paper describes in detail...
To study Internet's routing behavior on the granularity of Autonomous Systems (ASes), one needs to understand inter-domain routing policy. Routing policy changes over time, and may cause route oscillation, network congestion, and other problems. However, there are few works on routing policy changes and their impact on BGP's routing behaviors. In this paper, we model inter-domain routing policy as...
Wireless healthcare monitoring sensor networks are multi-hop Zigbee-based systems which usually use broadcast or multicast to reliably deliver vital diagnostics information or event detection to the sink. However, such schemes typically lead to high network traffic and large path search delay. This paper presents an efficient, adaptive, distributed routing mechanism, called anycast Q-routing to route...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.