The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
Traffic light congestion normally occurs in urban areas where the number of vehicles is too many on the road. This problem drives the need for innovation and provide efficient solutions regardless this problem. Smart system that will monitor the congestion level at the traffic light will be a new option to replace the old system which is not practical anymore. Implementing internet of thinking (IoT)...
We consider a system where a local cache maintains a collection of N dynamic content items that are randomly requested by local users. A capacity-constrained link to a remote network server limits the ability of the cache to hold the latest version of each item at all times, making it necessary to design an update policy. Using an age of information metric, we show under a relaxed problem formulation...
Sensitive information leaking of network servers attacked by malwares or hackers is a serious security risk of Internet. The paper presents a dynamic taint tracking based method to automatically detect sensitive data leaking. The method automatically tags sensitive data as taint data and monitors the propagation of taint data in memory. If the sensitive data is sent by sockets or written into files,...
Some software faults, namely security vulnerabilities, tend to elude conventional testing methods. Since the effects of these faults may not be immediately perceived nor have a direct impact on the server's execution (e.g., a crash), they can remain hidden even if exercised by the test cases. Our detection approach consists in inferring a behavioral profile of a network server that models its correct...
With the wide application of computer network, the server is considered as the core of the whole network application. Therefore, the server performance monitoring is becoming more and more important. Through the monitoring about the CPU, memory, and numbers of processes and other parameters of the server, it can judge the server performance is good or bad. However, most alarm systems are based on...
Bridge monitoring system is significant to health diagnosis of railway bridges. This paper proposed and developed a novel architecture for large span bridge monitoring. A 3-level distributed structure is adopted in the monitoring system which includes central server, intelligent acquisition node and local controller. Acquisition nodes are located across the bridge. All the acquisition nodes are managed...
A large university usually has many units that may locate far apart, and there are many proxy servers installed to give web access services to those units individually. However, some proxies may face the performance bottleneck when many users access the Internet simultaneously since such servers have limited capacity and could not handle high workload whereas the workload cannot be transferred to...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. The main problem in this paper is how to detect TCP...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly...
On the basis of analyzing the disadvantages of a general-purpose method for the server program design, a new method of the serial server program design based on the semaphore in Linux is introduced. Then, an implementation framework proposed by this paper is depicted. The number of the child processes which produced by the server that designed by this methods will no longer have a linear correlation...
Currently, virtualization is a proven technology that potentially provides a great opportunity for industry growth and research, due to its advantages in flexibility and cost reduction. However, designing virtual network environments is a complex process that requires great effort. For this, the work proposed in this paper is focused on applying modeling techniques to characterize virtual network...
Internet traffic measurement and analysis have been usually performed on a high performance server that collects and examines packet or flow traces. However, when we monitor a large volume of traffic data for detailed statistics, a long-period or a large-scale network, it is not easy to handle Tera or Peta-byte traffic data with a single server. Common ways to reduce a large volume of continuously...
Server consolidation and virtualization technology are used in modern data center as a method to improve the server utilization rate by encouraging the sharing of physical resources between virtual machines (VM). Although, this can be realized by plenty of virtualization softwares available in markets, creating a good management policy for the server consolidation environment is still a challenging...
One of the most promising and innovative developments in medicine are telemedical systems. The system PulmoTel 2010 and its internal validation are presented, focusing on the system architecture, hardware, software and communication solutions. PulmoTel 2010 consists of a distant server managing users and medical devices, as well as data transmission, processing, storage and presentation. The server...
The paper deals with application requirements of seamless communication between digital substation and control centre, especially model harmonization between IEC 61850 and 61970. The necessity and feasibility of IEC 61850 proxy acting as a communication server in substation is introduced. It also describes the proxy software design of functions and architecture. The proxy makes full consideration...
We deployed Field Servers in tropical zones such as India and Thailand for challenges in high temperature and found several problems to be solved technologically. Deployment of Field Servers under high temperature and lack of broad band Internet service is still big challenge as we so far deployed in Himalaya. High temperature and strong solar radiation destroyed low-cost Field Servers in half years...
For end-to-end QoS in IMS, our STB is designed to support virtual platforms such that a service provider is able to manage its own multimedia streams using feedback mechanism and ensure the desired QoS. The STB also works as a home gateway and provide QoS support to client nodes.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.