The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In underwater sensor networks (UWSNs), information transmission is extremely challenging because of the underwater channel. Underwater acoustic channel suffers from long propagation delay and low bandwidth is inclined to packet losses. Hence, the design of an energy efficient communication system is challenging under the water. In this paper, we present an energy efficient clustered multi-hop routing...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
Network Address Translation has often been described as an aberration in the evolution of the Internet, and one that will be removed with the completion of the transition of IPv6. This is an opinion in support of NATs, arguing that they are an important step in the evolution of the Internet and may well play a lasting role in this environment.
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
In this paper, we present L-SCN, a new routing architecture for Service-Centric Networking (SCN), which makes use of a two-layer forwarding scheme composed of inter-domain and intra-domain communication. Unlike existing SCN routing architectures relying on a flat organization, our design splits the network into domains. Nodes within a domain possess significant knowledge about existing services and...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recent past have shown that even small autonomous systems (ASs) are able to manipulate routing information with huge global impact. Even though countermeasures exist, they are not established at large scale yet. Monitoring of the actual routing state is the only mean to provide at least information about...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
Wireless Sensor Networks need energy efficient protocols for communication and data fusion to consolidate data and prolong the lifetime of the network. In this paper, an adaptive hierarchical clustering and routing method has been proposed. This clustering and routing method is based on maximum bottleneck energy routing (MBER) from a node to the sink. This method favors the routes with the highest...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
This paper proposes a technique to split a traffic in a software-defined network using a meter table. In general case, a different differentiated services code point (DSCP) number in a packet header is used to classify network traffic and provide quality of service (QoS). The traffic splitting technique uses a DSCP number as a split parameter. Once a packet exceeds a predefined traffic rate, the DSCP...
This paper proposes route advertisement policies (RAP) for the Border Gateway Protocol (BGP) with provider aggregatable (PA) addressing. The proposed RAP takes the advantage of address aggregation opportunity. If multiple address spaces are allocated to each of autonomous systems (ASes) that are multihomed to multiple upper ASes, reduction of the Forwarding Information Base (FIB) and quick convergence...
This paper evaluates switch-over time of a failure protection in a software-defined network (SDN). In the area of network protection, it is very necessary to overcome the link failure. This failure may cause the traffic interrupted and the packets are lost in the network. In this case the time of recovery of the failure should be as short as possible. In case of open shortest path first (OSPF) network,...
WSN(Wireless sensor network) depicted as an emerging technology, with its potential applications in the field of territory monitoring and industrial applications. The sensors employed in the surrounding environment will monitor the physical attribute changes such as temperature, humidity, etc. and makes notice of the data being gathered and delivers the gathered information to the (BS) base station...
Wireless sensor networks (WSN) are widely used to sense and measure physical conditions for different purposes and within different regions. However due to the limited lifetime of the sensor's energy source, many efforts are made to design energy efficient WSN. As a result, many techniques were presented in the literature such as power adaptation, sleep and wake-up, and scheduling in order to enhance...
The development and deployment of the Locator/ Identifier Separation Protocol (LISP), a paradigm introducing several benefits to the Internet architecture, is becoming widespread thanks to initiatives like the LISP-Lab project. Yet, LISP remains a relatively recent technology, hence, its actual performance when integrated with the current Internet remains still to be assessed. To tackle this issue...
The limited battery supply of a sensor node is one of the most important factors that limit the lifetime of the WSNs. As a consequence, increasing the lifetime of WSNs through energy efficient mechanisms has become a challenging research area. Previous studies have shown that instead of implementing direct transmission or multi-hop routing, clustering can significantly improve the total energy dissipation...
The exponential growth of the Routing Information Base (RIB) of the Internet's Default-Free Zone (DFZ) routers has raised concerns about non-scalability of the current Internet's routing architecture. The main reason is that Internet addresses currently carry information about both the identity and location (physical connection point) of devices connected to the Internet. The Locator/ID Separation...
As cars are ubiquitous in today's and tomorrow's cities they could play a major role in the communication of the future. In the last years the development of Inter-Vehicle Communication (IVC) took huge steps forward and therefore gives us exactly the tools needed to accomplish this task. We propose an architecture, named Car4ICT, that puts cars into the middle of future ICT systems. In this system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.