The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the development and expansion of Internet of Things (IoT), main challenges needing to be addressed are the heterogeneity, interoperability, scalability, flexibility and security of IoT applications. In this paper, we view IoT as a large-scale distributed cyber-physical-social complex network. From that perspective, the above challenges are analyzed. Then, we propose a distributed multi-agent...
Software Defined Networks (SDNs) is the latest technique that has made the existing networks more efficient in terms of scalability, performance and economical. However, SDNs are more vulnerable to different attacks and vulnerabilities. SDNs security is a major concern for all the stakeholders. The SDNs have centralized controller that is resilient to many security threats but the security attack...
Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the results of a thesis which focused to increase the scalability,...
In order to support large volume of transactions and number of users, as estimated by the load demand modeling, a system needs to scale in order to continue to satisfy required quality attributes. In particular, for systems exposed to the Internet, scaling up may increase the attack surface susceptible to malicious intrusions. The new proactive approach based on the concept of Moving Target Defense...
The rapid increase in the number and diversity of smart devices connected to the Internet has raised the issues of flexibility, efficiency, availability, security, and scalability within the current IoT network. These issues are caused by key mechanisms being distributed to the IoT network on a large scale, which is why a distributed secure SDN architecture for IoT using the blockchain technique (DistBlockNet)...
When a cloud scales out to a large size, the cloud network potentially extends to a multi-domain structure, and needs to keep its scalability, consistency and flexibility. Software-Defined Networking (SDN) provides the technical possibility to realize the requirements. However, the existing studies of SDN focus on the perspective of network builders and managers, different from the perspective of...
The memory system is a fundamental performance and energy bottleneck in almost all computing systems. Recent system design, application, and technology trends that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even more important system bottleneck [103, 110]. At the same time, DRAM technology is experiencing difficult technology scaling challenges...
The cloud architecture solutions evolve and they are recognized as the next generation computing infrastructure. This paper proposes a novel architecture for authenticating scalable resources in hybrid clouds, to integrate the automation of resource managing with the confirmation of identities by the operators. In order to reach the article's objective several steps were followed: the novel architecture...
The deployment of applications able to consume cloud infrastructure services is currently a tedious process especially when it should be often repeated in the application developing phase. We present a technical solution that simplifies the deployment process, as being almost fully automated. Its integration as a module of an open-source platform for enforcing security controls by its users is further...
This paper considers the quantitative measurementof information flow through a program -- the degree of influence a program's inputs can have over a set of specified program variables. This definition has been proposed as a refinement of taint analysis in the detection of a class of security flaws in programs. Unfortunately, the precise information flow by this definition is difficult to compute,...
Recent world events have amplified the need for improved safety and security to contend with natural and man-made threats. The universality and unpredictability of such threats have stimulated intense interest in smart pervasive surveillance systems. They are built by adopting smart sensor networks that cover large areas and can perform self-contained assessments of situations in the environment....
Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach can not meet the needs of cloud security. New cloud...
The objective of the work is to improve the mechanism for selecting trust nodes which will participate in the key generation process for secured group communication in a distributed environment like MANET. The selection is proposed in two stages, the first phase adopts clustering technique to identify trust worthy nodes across the network and the second phase makes use of the backtracking approach...
The police digital soldier equipment system has been a hot spot of police equipment development areas. But the speed of development cannot keep up with the pace of information age to match of eager need of police. In this paper, the concept of integration design is given to the development of PDSES. The overall development schema and framework is been discussed. Four key technologies: digital module...
Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recently, MTA has been extended where a tenant application can have its own sub-tenants as the tenant application acts like a SaaS infrastructure. In other words, MTA is extended to STA (Sub-Tenancy...
Scalability for distributed Data Center Networks (DCNs) has long been a goal of the network research and industrial community. To support dynamically increasing demands from multi-tenants, the network providers have to duplicate or share virtual resources for satisfying tenants' requests. However, current Software-Defined Networking (SDN) architectures have major drawbacks including lack of scalability...
Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. In the past, most of the research works focused on the effective use of the computational and storage resources by employing the Virtualization technology. Network automation and virtualization of data center LAN and WAN were not the primary focus. Recently, a key emerging trend in Cloud computing...
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker...
With the continuous development of high and new technology, network with wisdom will become the trend of network development. In this paper, we propose a novel architecture for network with wisdom based on the challenges faced existing network, and measure the wisdom of network.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.