The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deterministic replay, which provides the ability to travel backward in time and reconstruct the past execution flow of a multiprocessor system, has many prominent applications. Prior research in this area can be classified into two categories: hardware-only schemes and software-only schemes. While hardware-only schemes deliver high performance, they require significant modifications to the existing...
Many-core systems are increasingly popular in embedded systems due to their high-performance and flexibility to execute different workloads. These many-core systems provide a rich processing fabric but lack the flexibility to accelerate critical operations with dedicated hardware cores. Modern Field Programmable Gate-Arrays (FPGAs) evolved to more than reconfigurable devices, providing embedded hard-core...
On the financial side, a key factor for the success of a smart-city initiative is the low cost of the sensors. On the technical side, the units need to be flexible enough to cover different roles, and to be reconfigurable for a distinct target. The capability to interact with an already deployed infrastructure, like a preexistent web-server, is a favorable feature from both the financial and technical...
Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into network device tables. With heterogeneous devices, deployment is strongly bounded by the respective table constraints (size, lookup time, etc.) and forwarding pipelines. Hence, minimising the overall...
Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's...
In the past, virtualisation, and with it the move toward the cloud, has had a strong influence on the ICT (Information Communication Technology) sector, and now seems set to revolutionise the telecommunications sector as well. The virtualisation into software artefacts of functions that would usually be deployed as hardware has come to be known as Network Function Virtualisation (NFV), and the European...
The necessity to (re-)configure Internet of Things devices such as smart sensors during their entire lifecycle is becoming more important due to recent attacks targeting these devices. Allowing configuration parameters to be changed in any phase of a smart sensor's lifecycle allows security updates or new key material to be applied. Also, the functionality of a smart sensor can be altered by changing...
Highway Addressable Remote Transducer (HART) is an open fieldbus protocol for industrial automation and implemented in almost all the commercially available field transmitters and actuators. This paper details the intricacies and challenges involved in designing a HART Analog Input Module (HAIM) for the indigenous Supervisory Control And Data Acquisition (SCADA) solution developed at the Control and...
The Internet of Things (IoT) and cloud computing are the prime focus of the current research and development in all field of study. In this work, an attempt is made to enhance the integration of wireless sensor network (WSN) in IoT environment with cloud computing for health care system. IoT is a dynamic network infrastructure, that interconnects different sensor networks through Internet, acquire...
Today's data center servers are equipped with high speed and complex network adaptors, featuring an array of functions, e.g. hardware TX/RX queues, packet filters, rate limiters, etc. Recent work like IX, Arrakis, MultiStack has made us rekindle the user-level network stacks' innovation utilizing these commodity network adaptors. In this paper, we revisit the idea to move stacks' design from in-kernel...
Many multicore and manycore architectures support hardware cache coherence. However, most of them rely on software techniques to maintain Translation Lookaside Buffer (TLB) coherence, namely the TLB shootdown routine, which is a costly procedure, known to be hardly scalable.The TSAR architecture is a manycore architecture including hardware TLB coherence, but in which the TLB coherence mechanism is...
The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed embedded systems. It realizes decentralized (distributed) control method, where each node is equal to each other. This communication model allows the significant savings in the amount of transmitted data between end modules. However, there are many distributed embedded...
The number of software-defined controllers available in the market has increased greatly in the last few years. Nowadays, it is possible to find proprietary controllers as well as open source controllers. Examples are companies as HPE and Cisco that offer those two types of controllers to their clients simultaneously. It is also important to note that in both, the open source version is a commercial...
Small unmanned aircraft are being used in an increasing number of applications requiring cooperation between multiple heterogeneous vehicles. Multi-agent control algorithms can be implemented to control such systems but often require an underlying communications framework with integrated payloads. This paper presents a modular heterogeneous multi-agent control framework with payload integration. This...
In recent years, several important initiatives have appeared worldwide, aimed at bringing significant innovation in industrial networked systems (INSs). As an example, the Industry 4.0 and Factory of the Future frameworks are paving the way to modern intelligent factories, where issues such as the communication complexity between smart devices and system on-the-fly reconfiguration are dealt with in...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
In its current form, OpenFlow, the de facto implementation of SDN, separates the network's control and data planes allowing a central controller to alter the match-action pipeline using a limited set of fields and actions. To support new protocols, forwarding logic, telemetry, monitoring or even middlebox-like functions the currently available programmability in SDN is insufficient. In this paper,...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
Software Defined Network (SDN) is disruptive networking technology. In this paper, we will address some of the major vulnerable areas in SDN. We express some of the unique ways that an adversary can use to attack either the SDN controller or the communication devices. We have used a policy based approach to mitigate these attacks towards the SDN domain. We have implemented our Policy Based approach...
Most networking performance enhancements occur through specific static solutions, where the structure of the protocol stack remains unchanged. Instead, we focus on a flexible software and hardware co-design for the entire protocol stack. In this paper, we present EmbedNet, a System-on-Chip implementation of a flexible network architecture for the Future Internet, where parts of the protocol stack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.