The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is a vision for interconnecting all of the world's "things" -- from vehicles to diet scales, smart homes and electrical grids -- through a common set of networking technologies. Realizing this vision using a host-to-host communication paradigm, such as that of the Internet Protocol (IP), is challenging in the context of highly heterogeneous, constrained devices...
In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane,...
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this has been limited by our proximity to the third party (i.e. the same local area network) -- until now. The Internet Protocol version 6 (IPv6) includes...
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides third parties (whether malicious or not) with the...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP...
In this paper, Mosul University Wireless Local Area Network (MUWLAN) security will be evaluated. The evaluation was made to test the confidentiality, integrity and availability of the MUWLAN. Addressing these issues will help in ensuring tighter security. After the evaluation, serious security pitfalls were found that can allow any attacker to have access to the MUWLAN and uses their internet service...
In this paper, we tried to enable a mobile device as a resource to access to the grid network. By improved Internet technique, the use of mobile devices is rapidly increased. And some researches in grid computing tried to combine grid computing with mobile devices. However, according to properties of mobile environments, mobile devices have many considerations, such as mobility management, disconnected...
IPv6 over IEEE802.15.4 (a.k.a. 6LowPAN), has become the standard for low-rate wireless personal area networks (LR-WPAN). IPv6 is taken as an interconnection scheme for IEEE802.15.4 equipments at network layer, 6LowPAN technology has attracted extensive attention. This paper introduced IEEE802.15.4 standard and 6LowPAN technology, discussed 6LowPAN's advantages, analyzed its key technologies, and the...
A novel video monitoring system is proposed to provides a more excellent solution for security. The core architecture of this system is constructed by using wireless mesh network (WMN), which has emerged in recent years. WMN is dynamically self-organized and self-configured and can provide better services than other wireless networks. The basic network of this system is divided into two layers: access...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Video-streaming can now be offered on third-generation (3G) mobile networks. Most research efforts have focused on video download. This paper presents a detailed study of challenges faced for successfully deploying applications requiring life video upload. Both subjective and objective qualities as well as the effects of mobility are analyzed on real 3G networks. Consequently, video profiles are identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.