The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of this covert channel is to prove the feasibility of using encrypted HTTPS traffic to carry a covert channel. The encryption key is not needed because the original HTTPS payload is not decrypted. The covert message will be appended to the HTTPS data field. The receiver will extract the covert channel and restore the original HTTPS traffic for forwarding. Only legitimate HTTPS connections...
The inter-domain routing protocol of the Internet, i.e., Border Gateway Protocol (BGP), is vulnerable to malicious attacks. Although many security solutions for BGP have been proposed, they have mainly focused on topology-based security. Policy-based security has largely been overlooked—a severe concern especially since BGP is a policy-based routing protocol. In this paper, we present an Expectation...
Multicasting is a way to deliver copies of single message to multiple recipients at different locations. On the traditional internet, group members join specific multicast address through membership management protocol and packets are delivered along the path tree built by multicast routing protocol. Now we consider how multicast communication can be designed in id/locator separation environment....
Commercial community wireless networks usually rely on wireless donors to give away Internet access while at home in exchange for access while they are mobile. The donors who make up the network get nothing immediate in return for providing Internet access. In this paper, we explore automatic configuration for a model of community networks in which donors mesh with each other and can aggregate Internet...
Stable and reliable communication is essential in disaster scenarios. Mobile Ad hoc Networks (MANETs) provide a network that is fast to setup and that works independently of possibly damaged infrastructure. This is important during disaster rescue and recovery missions. But single isolated MANETs are able to cover only a limited area. Therefore, it is necessary to interconnect these individual networks...
In this paper, we propose an autonomic network management system that analyzes, evaluates, and optimizes the redundancy of routes providing access to remote sites from a local area network. The proposed solution ARRC is based on SNMP as simple network management protocol to monitor the gateways, analyze their layer 3 operations and perform an extra configuration that enhances the availability of network...
Transition techniques play a vital role during the evolvement process of the Internet from IPv4 to IPv6. However, packet length change during the forwarding process may result in fragmentation and reassembly of a large number of packets, which greatly impacts the forwarding performance. In addition, different Maximum Transmission Unit (MTU) mechanisms of IPv4 and IPv6 have also brought lots of troubles...
In building automation, IP-based communication is commonly used. However, availability and reliability recently gained importance in this domain since even safety critical applications (e.g., fire alarm systems) are integrated in building automation networks. Usually, IP-based communication systems, as they are used in functional buildings, do not provide redundancy mechanisms. However, redundancy...
Traditional IP based networks, Frame Relay and ATM networks have many disadvantages in the management operation of large networks such as cost, security, scalability and flexibility. To solve this, an MPLS-based VPN networking is introduced that can work with existing deployed backbones and allow organizations to interconnect the dispersed sites and remote workers through secure links by using public...
A recent trend in clean-slate network design has been to separate the role of identifiers from network locators. An essential component to such a separation is the ability to resolve names into network addresses. One challenge facing name resolution is securing the name resolution service. This paper examines the security of a clean-slate name resolution service suitable for mobile networking. We...
The Department is increasingly relying on IP multicast to support a growing demand for disseminating intelligence, surveillance, and reconnaissance (ISR) and to maximize bandwidth savings across strategic and resource-constrained tactical edge networks. A number of operational communities, including Global Broadcast Service (GBS), US Central Command (CENTCOM) Digital Video Broadcast — Return Channel...
Recent vehicular networking activities include public vehicle to vehicle/infrastructure (V2X) large scale deployment, machine-to-machine (M2M) integration scenarios and more automotive applications. eHealth is about the use of the Internet to disseminate health related information, and is one of the promising Internet of Things (IoT) applications. Combining vehicular networking and eHealth to record...
Now-a-days with the increasing number of mesh clients it has become a challenging task to provide uninterrupted internet connectivity for the clients. To solve this problem several mobility management schemes such as iMesh and MEMO, have been proposed. The major drawbacks of these schemes are: larger handoff delay and higher signaling overhead. A new mobility management scheme named Forward Pointer...
The paper is focused on the Floyd-Warshall all-paths routing algorithm, presenting its first implementation in OMNeT++ simulator. The experiments are trying to demonstrate that Floyd-Warshall's use for a routing protocol is more efficient from infrastructure provider's perspective. The performances are compared to the results obtained when employing distance-vector protocols (such as RIP) or link-state...
Embedded devices connected to the Internet will start an increasing growth of the Internet in near future. Wireless Sensor Networks (WSN) will play a major role in that growth. In the past several solutions were proposed to make sensor network sip capable. Today there are IPv6-Stacks available including web servers running on sensor nodes. However, a gateway is always needed to convert the routing...
Consumer computers or home communication devices are usually connected to the Internet via a Network Address Translation (NAT) router. This imposes restrictions for networking applications that require inbound connections. Existing solutions for NAT traversal can remedy the restrictions, but still there is a fraction of home users which lack support of it, especially when it comes to TCP. We present...
This paper provides an indication that the distance between clients and their local DNS servers (LDNS) can have a significant negative impact on the performance of content delivery networks (CDNs). Consequently, we propose a novel peer-topeer client-side DNS mechanism that moves LDNS close to their clients while still allowing nearby clients to share the common DNS cache. Through trace-driven simulations...
Location management in wireless networks serves the purpose of tracking mobile nodes and locating them prior to establishing new communications. However, existing location management schemes in cellular and wireless local area networks cannot be directly applied to wireless mesh networks (WMNs) without non-trivial modifications due to the special properties of WMNs. In this paper, we propose a hybrid...
IPv6 is the next generation Internet Protocol. After a decade of deployment and platform integration, it stands ready to revolutionize the internet, networking, and the telecommunications industry. With the increasing number of networks, router performance needs to be upgrade with time. However with the present global routing table about 3k many routers face difficulties of handling the routing table...
DDoS is one of the most dangerous methods to attack victim network because it uses a vast quantity of distributed agents to make victim paralyze. This paper gives a DDoS defense method which is based on “pushback and communicate” idea (PaC method). When the gateway of victim detects DDoS attack, it has to listen on interfaces to define the neighbors from which DDoS packets come. Those neighbors will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.