Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
WiFi networks are vulnerable to rogue AP attacks in which an attacker sets up an imposter AP to lure mobile users to connect. The attacker can eavesdrop on the communication, severely threatening users' privacy. Existing rogue AP detection solutions are confined to some specific attack scenarios (e.g., by relaying the traffic to a target AP) or require additional hardware. In this paper, we propose...
To satisfy the increasing demand of wireless sensor network (WSN) distribution in the different monitoring area and enlarge the coverage of the WSNs in various scenes of application, in this paper, we constructed a new type of mobile wireless data sinking platform for collecting the data of WSN based on the technology of unmanned aerial vehicle (UAV). First, the authors studied a wireless environmental...
Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection schemes that systematically combine localized monitoring, location estimation and node collaboration. Extensive simulation...
Future wireless networks will have to provide seamless connectivity anytime and everywhere while fulfilling conditions concerning sustainable bit rates and maximum delays. Next generation wireless networks will provide communication services not only to persons but also to machines which will have as consequence a significant increase of the number of terminals connected and involved in the communication...
Coverage is an important metric used to measure the quality of service of wireless sensor networks monitoring a field of interest (FoI). Existing literature on the coverage problem assumes that the sensors are deployed directly in the FoI. These results cannot be applied in some applications like canal water surface monitoring, because the sensors cannot be deployed on the water surface. In this paper,...
With the ongoing growth of mobile Internet usage numbers and the continuous deployment of additional mobile network nodes, the power consumption in mobile networks is increasing at dramatic rates leading to a huge amount of carbon emissions. Therefore, improving energy efficiency in mobile radio networks is of increasing relevance. The reduction of energy consumption in mobile radio networks can be...
Traditionally, data collected from water quality monitoring systems are typically stored in closed repositories that are not shared with the public. Due to the cost and environmental limitations traditional water quality monitoring systems cannot collect sufficient samples to reflect the overall status of water quality. In this paper, the monitored data were transmitted in real time by WCDMA to the...
In this work, we present a monitor and rescue system utilizing hybrid networks which is a integration of stationary sensor networks and mobile sensor networks: stationary sensor networks comprised of large numbers of small, simple, and inexpensive wireless sensors, and the mobile sensor network contains a set of mobile sensors (robots). The static sensors in our network have “monitoring” ability,...
The increasing demand for all time and every where services requires the network operators to integrate different kinds of wireless and cellular networks. To enable this integration, it is important that users can roam freely across networks. But, as different technologies are involved, the problem of vertical handover (VHO) needs to be addressed. Solutions in the literature lack intelligence and...
"The Marauder's Map" is a magical map in J. K. Rowling's fantasy series, "Harry Potter and the Prisoner of Azkaban". It shows all moving objects within the boundary of the "Hogwarts School of Witchcraft and Wizardry". In this paper, we introduce a similar attack to location privacy in wireless networks. Our system, namely the digital Marauder's map, can reveal the locations...
Content stored on multiple devices owned by people can be accessed and shared via heterogeneous wired and wireless networks. Wireless networks frequently suffer link disconnections, an inherent feature in these types of dynamic environments. These link disconnections occur due to user mobility and wireless characteristics and result in reduced content accessibility to users. This paper presents a...
Nowadays, many intrusion detection and tolerance systems have been proposed in order to detect attacks in both wired and wireless networks. Even if these solutions have shown some efficiency by detecting a set of complex attacks in wireless environments, they are unable to detect attacks using transaction based traffic in wireless environments. In this context, we propose an intrusion detection and...
This paper presents a system for a location-based discovery of points of interest, based on the current geographic position of mobile users. The proposed approach exploits a mixture of Web 2.0 technologies (for the localization of point of interests), positioning techniques and cross-layer networking schemes for a seamless navigation, while moving through different and heterogeneous wireless networks.
The concept of Mobile Web Services (Mob-WS) is catching pace within research communities due to rapid classification of mobile devices enabling pervasive environments. Beside consumer oriented use cases, another aspect of utilizing the potential of Mob-WS is to use them as computation resources within a wireless network. Such Mob-WS are called ldquoIn-network Mob-WSrdquo. In this paper we propose...
As services utilizing USN increases, various simulators that virtually enables sensor network have been developed. This paper suggests MOUL framework - a framework that provides status information of sensor network with mobile object - which is different from existing frameworks that use simulators to verify packets, protocols, and networks models. MOUL calculates sensing rates of different sensor...
The co-existence of heterogeneous access technologies with largely different characteristics results in handoff asymmetry. As the convergence of dissimilar networks has been envisioned to characterize the next generation wireless networks, the seamless and efficient handoff between different access technologies (vertical handoff) has become essential. As the "best" network has to be chosen,...
When GSM was introduced in the early 90's, it was considered an over specified system. Nowadays it is obvious that the whole range of services is widely in use, and in addition performance is degrading due to the rapidly increased number of mobile subscribers, numbering over 2.9 billion subscribers in the world today. The performance of cellular networks is the most important issue concerning their...
A new network transmission framework highlighting the concept of cross-layer co-design for packet loss reduction is presented in this article. The proposed framework takes into account the correlation between the packet loss rate and the packet size under a given channel condition, and assigns different tasks to layers involved: physical/ MAC layer for monitoring current channel statuses, IP layer...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
Experimental results are presented for end-point controlled handover of a stream of voice-like packet data traffic between two independent wireless networks. The handover was achieved by using a version of the stream control transmission protocol (SCTP) that had been modified to monitor link quality and switch the primary connection to the ldquobestrdquo quality link available, where quality is evaluated...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.