The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low-Power Wide-Area networks promise to deliver limited IoT payloads reliably at distances in excess of 10 km raising the possibility of thousands of IoT devices connected to a single base station. PlanIt is a web application able to visualize connectivity in these large-scale deployments prior to deploying hardware or even making a single signal-strength measurement. DQ-N is an adaptation of distributed...
Detecting anomalous Border Gateway Protocol (BGP) traffic is significantly important in improving both security and robustness of the Internet. Existing solutions apply classic classifiers to make real-time decision based on the traffic features of present moment. However, due to the frequently happening burst and noise in dynamic Internet traffic, the decision based on short-term features is not...
Wireless Sensor Networks has evoked a lot of attention in recent years as it offers a broad horizon of applications in environmental monitoring. Security of such networks is a key area of research as traditional techniques cannot be employed due to their low energy and memory constraints. The cornerstone of security primitives in cryptography is a key exchange. In this paper Elliptic Curve Cryptography...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
This paper presents the simulation of Application Protocol data Unit (APDU) exchanged between a microcontroller smart card and its reader/terminal, that are made according to the Standard ISO 7816, allowing to get basic understanding of how easy it can be to access smart cards from any reader. Programming APDUs commands and responses are made in assembly language to enable a better understanding of...
Action recognition in a video plays an important role in computer vision and finds many applications in areas such as surveillance, sports, and elderly monitoring. Existing methods mostly rely on stationary backgrounds. Action recognition in dynamic backgrounds typically requires standard preprocessing steps such as motion compensation, background modeling, moving object detection and object recognition...
Curiosity is a key element of human development, driving us to explore spontaneously novel objects, activities and environments [1]. Curiosity-driven exploration strategies permit us to interact, learn and evolve quickly in an open ended world. It is thus an important challenge to understand the fundamental mechanisms of spontaneous exploration and curiosity in humans.
The quantity of data that is captured, collected, and stored by a wide variety of organizations is growing at an exponential rate. The potential for such data to support scientific discovery and optimization of existing systems is significant, but only if it can be integrated and analyzed in a meaningful way by a wide range of investigators. While many believe that data sharing is desirable, there...
Secure multiparty computation allows multiple parties to participate in a computation. SMC (secure multiparty computation) assumes n parties where n>1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy of individual's data. Privacy preserving data mining...
In this paper, we use statistical tools to analysis dependency between Wireless Sensor Network (WSN) parameters and overall Energy Consumption (EC). Our approach has two key steps: profiling, and effective parameter extraction. In former step, a sensor network simulator is re-run 800 times with different values of the WSN parameters to profile the average residual energy in nodes. In latter step,...
This paper elicits and models the requirements of a decentralized carbon emissions trading platform (CarboCoin). CarboCoin platform is based on the Bit coin, a peer-to-peer digital currency with no central authority. CarboCoin is focused on providing high privacy protection for participants in order to encourage more engagement in carbon emissions reduction process. CarboCoin requirements are elicited...
One of the most fundamental goals in cryptography is to design protocols that remain secure when adversarial participants can engage in arbitrary malicious behavior. In 1986, Goldreich, Micali, and Wigderson presented a powerful paradigm for designing such protocols: their approach reduced the task of designing secure protocols to designing protocols that only guarantee security against “honest-but-curious”...
Inter-Vehicle Communication (IVC) is a promising technology for the next generation of automotive vehicles. Recent advancements in IVC enabled the use of a wide range of safety and infotainment applications. Due to the fact that practical experiments are often not feasible, simulation of network protocol behavior is preferred. In this paper, we propose an ETSI complaint Geonetworking protocol layer...
This article presents an architecture for research and development of peer-to-peer (P2P) systems. A complete P2P application has to cope with problems such as NAT-traversal, bootstrapping, connection management, routing, storage, and security. Therefore, our approach separates the system into layers and components. A developer can easily build a complete P2P stack by plugging layers and components...
Trusted transaction is becoming more and more important as malicious user or agent inside the network may compromise the upcoming transaction. Trusted Computing mutual remote attestation mechanism is a relative new approach to overcome this problem. But limited computation capability of TPM device on the sever side is an obvious bottleneck of scalable performance. by introducing a novel high efficient...
In this paper we present ToroVerde, a novel push-based peer-to-peer (P2P) content distribution application exploiting the digital fountain concept through the use of rateless codes. We provide the protocol specification, then describe the simulator and the complete prototype we have developed for Planetlab deployment and testing. To this end, we consider flash crowd and steady arrival patterns as...
As the IEEE 1516 standard for distribution simulation, High Level Architecture (HLA) framework does not solve the issues of scalability, dynamic load-balance and fault tolerance. HLA does not support federation migration, which would balance the system workload on heterogeneous distributed resources and consequently improve simulation's performance either. In this paper, a Grid based Advanced Distributed...
Web Services are at the heart of many Internet-based e-business systems. Security issues in web services are critical for the continuity of the provided services. Solutions such as Role-Based Access Control and Trust-Based Access Control were proposed to address threats to security in single Web Service scenarios. These solutions do not fully provide the required security level in situations related...
Attack graphs can be applied to analyze network security, but there are two issues, namely scalability and loop. To solve these problems, we propose a new kind of attack graph named GP-AG, which is generated based on greedy policy. The construction process of GP-AG falls into two phases, the first phase generates the main attack graph with complete greedy policy, and the second phase generates all...
Signature Detection modules in IDS/IPS though accurate in pattern matching, yet it leads to false positives. This is due to the incompleteness of the signatures which lacks or has very little information about when, where and how to match these signatures. The signatures enriched with this information significantly brings down the false positives and at the same time enhances the performance of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.