Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We investigate security of key exchange protocols supporting so-called zero round-trip time (0-RTT), enabling a client to establish a fresh provisional key without interaction, based only on cryptographic material obtained in previous connections. This key can then be already used to protect early application data, transmitted to the server before both parties interact further to switch to fully secure...
The software defined networking is attracting significant attention from business and private end-users. With characteristic of virtualization and programmability, Service Providers (SPs) can pay for the resources in the term of virtual data centers (VDCs) to deploy their services without maintaining expertise. Despite advantages the new paradigm brings, offering VDCs as a service still faces a new...
Internet of things (IoT) or Web of Things (WoT) is a wireless network between smart products or smart things connected to the internet. It is a new and fast developing market which not only connects objects and people but also billions of gadgets and smart devices. With the rapid growth of IoT, there is also a steady increase in security vulnerabilities of the linked objects. For example, a car manufacturer...
Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems...
This paper presents a BFT Atomic Multicast Protocol (BAMcast) for Wide Area Networks. Our algorithm manages to implement a reliable consensus service with only 2f + 1 replicas using only common technologies, such as virtualization and data sharing abstractions. In order to achieve this goals, we chose to adopt a hybrid model, which means it has different assumptions between components regarding synchrony,...
This paper presents the idea for achieving trustworthiness by splitting responsibilities between different parties mutually mistrusting one another. These parties are called mistrust-parties because some kind of mistrust between these parties is actively created to prevent potentially manipulative cooperation.
Web services are widely used to enable remote access to heterogeneous resources through standard interfaces and build complex applications by reusing existing component services. However, massive commodity computers, storage, network devices and complex management tasks running behind web services make them subject to outage and unable to provide continuously reliable services. To address this issue,...
Expansion in the use of the World Wide Web led to the creation of a new phenomenon in our daily life which is a phenomenon of electronic commerce. E-commerce is generally known as any form of trade or administration or exchanging of information that are conducted by using information and communication technologies. Capacity of electronic commerce is expected to grow rapidly, and play a vital role...
In the IEEE 802.11 networks a data packet is delivered to multiple receivers through the multicast paradigm. Since multicast has not a feedback scheme, the reliability of the service provided to the user is penalized. This issue is more important as the network load or the coverage area increases. These two facts cause collisions or corrupted delivery due to bad channel conditions, respectively. In...
Security is a fundamental issue in the deployment of any kind of network, in particular those networks that affect people integrity. It is therefore important to detect the existence of any failure and to try to avoid its propagation as much as possible. In order to take maximum advantage of ad-hoc networks, protocols should be adapted to these new technologies by proposing new alternatives to centralized...
Substation automation requires 4 μs accuracy and high availability of the clock synchronization mechanism. The clock synchronization protocol IEEE1588 satisfies the accuracy requirement under normal operation, but a failure on a grandmaster clock causes a large time error on the slave due to transient response by feedback loop. The failure may also trigger another failure on another grandmaster clock...
Due to the dramatic increase in the number of accidents all over the world, a rapid emergence of wireless vehicular networks has been perceived in the last few years, particularly, aiming at improving safety and efficiency in the road. Such applications require broadcast communications to disseminate emergency information in brief delay for all the vehicles in the area of danger. Designing an efficient...
Delay Tolerant Networking (DTN) is currently an open research area following the interest of space companies in the deployment of Internet protocols for the space Internet. Thus, these last years have seen an increase in the number of DTN protocol proposals such as Saratoga or LTP-T. However, the goal of these protocols are more to send much error-free data during a short contact time rather than...
In this paper we propose a set of different configurations of failure recovery schemes, developed for network-on-chip (NoC) based systems. These configurations exploit the fact that communication in NoCs tends to be partitioned and eventually localized. The failure recovery approach is based on checkpoint and rollback and is aimed towards fast recovery from system or application level failures. The...
In this paper, we introduce and evaluate ScaleMesh, a scalable miniaturized dual-radio wireless mesh testbed based on IEEE 802.11b/g technology- ScaleMesh can emulate large-scale mesh networks within a miniaturized experimentation area by adaptively shrinking the transmission range of mesh nodes by means of variable signal attenuators. To this end, we derive a theoretical formula for approximating...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Due to resource constraints, digital image transmissions are a significant challenge for image sensor based wireless sensor networks (WSN). In this paper, we propose a novel robust and energy-efficient scheme, called image component transmission (ICT) in WSN by providing various levels of reliability during image transmissions. Essential components such as the information for the positions of significant...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.