The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Understanding tradeoffs among stakeholder requirements regarding liveness (something good happens) and safety (nothing bad happens) is crucial for designing sociotechnical systems (STSs). Safety-focused specifications restrict agents' actions to avoid undesired executions. However, such restrictions hinder liveness. We formalize such tradeoffs using the elements of an STS specification to understand...
Future large-scale parallel computer systems, including exascale systems, will operate under an overall power bound. This bound will be enforced by having nodes adhere to local power caps, the sum of which cannot exceed the global power bound. To make efficient use of the available power, protocols have been developed to shift power between nodes, for example to compensate for load imbalance or system...
Data in an object may flow into another object if transactions read and write data in the objects. A transaction illegally reads data in an object if the object includes data in other objects which are not allowed to be read. In our previous studies, the flexible read-write-abortion with role sensitivity (FRWA-R), object sensitivity (FRWA-O), and role safety (FRWA-RS) protocols are proposed to prevent...
Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address...
The Border Gateway Protocol (BGP) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by independently setting local policies on route filtering and selection. This independence leads to fragile networking and makes analysis of policy configurations very complex. To aid the systematic and efficient study of the...
The UMTS Long Term Evolution (LTE) is the latest and most advanced cellular technology that is coming to market. As LTE and its advanced version promise unprecedented peak data rates both in uplink and downlink, they seem to represent a striking solution for many fields requiring mobile broadband access. Nowadays, one area that is strongly emerging is represented by public safety communications. In...
Vehicular Ad-hoc Network (VANET) is a type of mobile communication in which topology changes dynamically due to high mobility of vehicles. Vehicles use two types of messages to update their status and to communicate with other vehicles. First is Periodic Safety Message (PSM) which gives us information about position, speed etc. and second is Event Driven Safety Message (ESM) which occurs when emergency...
Inter-Vehicle Communication (IVC) is a promising technology for the next generation of automotive vehicles. Recent advancements in IVC enabled the use of a wide range of safety and infotainment applications. Due to the fact that practical experiments are often not feasible, simulation of network protocol behavior is preferred. In this paper, we propose an ETSI complaint Geonetworking protocol layer...
Vehicular Sensor Network (VSN) is being seriously considered as a key enabling technology as it allows vehicles to communicate with each other (v2v) and/or with roadside infrastructure (v2r). Effectively use of wireless communication can enhance various types of traffic applications. Dedicated Short-Range Communication (DSRC) standard is an ideal candidate for supporting wireless access in VSN environment...
The use of IEEE 802.11p for supporting intelligent transportation systems (ITS) enables enhancing the drive experience to provide vehicle users with useful information related to road efficiency and public safety. Safety services, such as collision or sudden hard braking warning, are used to improve passenger safety and reduce fatalities. Along with the delay-critical nature of those services, the...
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
This paper presents a new event-B based approach to reasoning about interaction protocols. We show how an event-B model can be structured from AUML protocol diagrams and then used to give a formal semantic to protocol diagrams which supports proofs of their correctness. More precisely, we give rules for the translation of protocol diagrams into event-B language. In particular, we focus on the translation...
Byzantine and rational behaviors are increasingly recognized as unavoidable realities in todaypsilas cooperative services. Yet, how to design BAR-tolerant protocols and rigorously prove them strategy proof remains somewhat of a mystery: existing examples tend either to focus on unrealistically simple problems or to want in rigor. The goal of this paper is to demystify the process by presenting the...
The bugbear of model checking is the explosion in the number of states as the number of processes increases. Industrial-sized problems are often intractable for model checkers. We modify the most popular model checker in use today, SPIN, by replacing its internal verification search engine by a guided, random-walk based simulator. The resulting tool is called RANSPIN. The guiding mechanism used in...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.