The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years the use of wireless ad hoc networks has seen an increase of applications. A big part of the research has focused on Mobile Ad Hoc Networks (MAnETs), due to its implementations in vehicular networks, battlefield communications, among others. These peer-to-peer networks usually test novel communications protocols, but leave out the network security part. A wide range of attacks can happen...
This paper presents the development of an Indigenous On-Board Diagnostic Kit and a remote on-line diagnostic system for Euro standard vehicles using On-Board Diagnostics (OBD) and GSM technology. The different parts of the system are indigenous developed OBD Kit, Communication Module and GUI for main server. The vehicles are equipped with OBD kits and communication modules with GSM, The Electronic...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
Semantic web technologies have gained some spot-light in recent years, mostly explained by the spread of mobile devices and broadband Internet access. As once envisioned by Tim Berners-Lee, semantic web technologies have fostered the development of standards that enable, in turn, the emergence of semantic search engines that give users the information they are looking for. This paper presents the...
The purpose of this paper is a presentation of a recursive project (a platform), that started three years ago, in which shore management companies can collect, transmit, store, analyze and finally use and present vessels live data on a Geographical Information System used as Global Monitoring Platform. We used those data for further analysis, and we produced information about engine performance, gas...
Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation...
Automated Assist for Car Maintenance is an android application that is developed to assist an average person in day to day minor glitches caused by automobiles. As automotive industries are constantly expanding, the need for the maintenance of vehicles is escalating. This also helps in identifying emergency engine diagnostic trouble codes (DTC) that can be dealt with minimum vehicular repair experience,...
Scientific HPC applications along with the emerging class of Big Data and Machine Learning workloads are rapidly driving the fabric scale both on premises and in the cloud. Achieving high aggregate fabric throughput is paramount to the overall performance of the application. However, achieving high fabric throughput at scale can be challenging - that is, the application communication pattern will...
Currently, when companies conduct risk analysis of own networks and systems, it is common to outsource risk analysis to third-party experts. At that time, the company passes the information used for risk analysis including confidential information such as network configuration to third-party expert. It raises the risk of leakage and abuse of confidential information. Therefore, a method of risk analysis...
We present Hammer, a real-world, end-to-end network traffic simulator, capable of simulating complex and dynamic network, user and server behaviors. The focus of this tool is to primarily facilitate investigations related to product stability, for instance different aspects of capacity, longevity, memory leaks, cores and also handle customer content testing that will reveal the behavior of the device...
This paper introduces a new communication paradigm called Decentralized Communications, which enables cross-domain communication services to trustfully use peer-to-peer networks. Decentralized Communication services are inherently inter-operable without the need to standardize protocols or service APIs. This property is achieved by using the Protocol-on-the-fly concept and the Reporter-Observer communication...
Exergames have been the subject of research and technology innovations for a number of years. Different devices and technologies have been utilized to train the body and the mind of senior people or different patient groups. In the past, we presented FitForAll, the protocol efficacy of which was proven through widely taken (controlled) pilots with more than 116 seniors for a period of two months....
The exhaustion of IPv4 addresses has led to the transition to IPv6 becoming a major task for the Internet. Providing IPv6 users with accessibility to IPv4 services has been one of the most challenging tasks during the IPv4/IPv6 transition. However, some protocols contain IP addresses in the application layer, resulting in incompatibilities in traversing the network-layer translators. In this paper,...
The novel “stateful” approach in Software Defined Networking (SDN) provides programmable processing capabilities within the switches to reduce the interaction with the SDN controller and thus improve the scalability and the performance of the network. In our work we consider specifically the stateful extension of OpenFlow that was recently proposed, called Open-State, that allows to program simple...
This paper details a measurement study on the impact of different HTTP-based application layer protocols, namely HTTP/1, HTTP/2 and QUIC, on video streaming performance. In this context we evaluate the influence on the initial delay until video playout is started using the live version of the YouTube platform. Furthermore, we evaluate how different network parameters, i.e. bandwidth, RTTs and packet...
Authentication and encryption within an embedded system environment using cameras, sensors, thermostats, autonomous vehicles, medical implants, RFID, etc. is becoming increasing important with ubiquitious wireless connectivity. Hardware-based authentication and encryption offer several advantages in these types of resource-constrained applications, including smaller footprints and lower energy consumption...
The distribution of a common time reference is a well known problem in traditional measurement systems. The Internet of Things (IoT) scenario is characterized by an higher dynamism. A given device can be reconfigured for serving different applications, that may have different requirements in terms of synchronization accuracy. Therefore, it is not possible to define in advance the optimal solution...
The Electronic Control Module (ECM) is the heart of the electronic engine. It looks after the supervisory and the controlling parameters of the engine. Its main function is to monitor all the parameter of the engine and act accordingly to increase the efficiency of the system. For mechanical engine, there is no supervisory control over the working i.e. any faults in the engine cannot be realized immediately...
Parallel simulation technology is broadly used in complex system and real time simulations, such as Autonomous Decentralized System (ADS) and Internet of Things (IoT). Rollback mechanism is a key factor to improve the performance of optimistic parallel simulation. In this paper we first introduce the common time synchronization protocols and rollback recovery mechanisms in parallel simulation. Then...
In this paper we propose a collaborative distributed denial of service (DDoS) attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C) protocol that allows SDN-controllers lying in different autonomous systems (AS) to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.