The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However,...
One of interesting problems, arising with deployment of large-scale systems, is integration of its nodes (systems / devices). In this work, we discus how to apply semantic technologies, as a mechanism to support node integration and facilitate interoperability within the developed ecosystem. We focus on pragmatic aspects of the proposed solution, discussed from the perspective of the Dependable Embedded...
A distributed system is presented for the monitoring and control of the primary variables: pressure, level and flow; for this, a wireless system is implemented at the level of sensor-actuators and at the level of controllers an Ethernet / IP network, the mentioned industrial networks are implemented based on the OSI model and TCP / IP respectively, for the visualization an HMI is realized in the software...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
In-network caching has the potential to improve network efficiency and content distribution performance by satisfying user requests with cached content in Information-Centric Networking (ICN). Due to the fact that users in the same network domain can easily share their cached content with each other via home network devices, to reduce the transmission cost for obtaining content from the core network,...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
A novel run-pause-resume (RPR) debug methodology that can achieve complete cycle-level granularity of debug resolution for multiple clock domain systems is proposed. With this methodology one can pause the normal operation of a system at any cycle of any clock domain and resume the system without causing any data invalidation problem. Bidirectional transactions among different clock domains are analyzed...
The run-pause-resume (RPR) debug methodology allows one to pause the normal circuit operations, observe the internal states of flip-flops and then resume the normal operations for further debug process. Data invalidation is a major problem that needs to be addressed when debugging a multiple-clock design with this methodology. This problem occurs when flip-flops in a receiving clock domain capture...
This paper will suggest a robust method for a network layer Moving Target Defense (MTD) using symmetric packet scheduling rules. The MTD is implemented and tested on a Supervisory Control and Data Acquisition (SCADA) network testbed. This method is shown to be efficient while providing security benefits to the issues faced by the static nature of SCADA networks. The proposed method is an automated...
Door phone systems, allowing occupants of a building to communicate with visitors at the door, have evolved over the years, with the current advancements being a fully internet protocol (IP) based solution. In order to adopt newer IP based solutions, current analogue systems can be replaced, yet this may be costly and cumbersome, especially in a conventional multi-occupant building. We therefore propose...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
Smart IoT applications require connecting multiple IoT devices and networks with multiple services running in fog and cloud computing platforms. One approach to connecting IoT devices with cloud and fog services is to create a federated virtual network. The main benefit of this approach is that IoT devices can then interact with multiple remote services using an application specific federated network...
Cloud Control System is proposed based on Cloud Computing, Networked Control System and Internet of Things. It inherits the “3C” (Computing, Control and Communication) from Cyber-physical System and provides powerful ability of data storage and processing to serve control system. It is getting popularity day by day in the modern CS architecture, because of its ground breaking future applications....
Software-defined networks (SDN) are vulnerable to most of the attacks that traditional networks are vulnerable to. In addition, SDN has introduced new vulnerabilities through its unique architecture such as those related to the southbound and northbound controller interfaces. In this paper, we introduce a lightweight flow-based Intrusion Detection System (IDS) that periodically gathers statistical...
We developed a 4Mb split-gate e-flash on 28-nm low-power HKMG logic process, which demonstrates the smallest bit-cell size (0.03×-um2) for high performance IoT applications. High speed operation (25us write time and 2ms erase operation) and robust reliability (500K cycle, 10 years retention) are achieved through optimization of triple-gate flash architecture and scaling of word-line (WL) transistor...
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing...
In this paper, we propose a scheme to protect the Software Defined Network(SDN) controller from Distributed Denial-of-Service(DDoS) attacks. We first predict the amount of new requests for each openflow switch periodically based on Taylor series, and the requests will then be directed to the security gateway if the prediction value is beyond the threshold. The requests that caused the dramatic decrease...
In the ABB Freelance process control system, it is difficult to compose the complex intelligent control algorithm using industrial programming language. In order to realize the intelligent control algorithm applied in ABB Freelance quickly, Proposed the use of the system application interface to achieve VC + +, MATLAB and other environmental development of customer applications directly with the ABB...
In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed...
All active sessions of an ordinary host will be broken if the host changes its IP address as a result of migrating to a new subnet. Traditional solutions toward this problem either need modifying mobile hosts or create tunnels that cause inefficient triangle routing. SDN-based mobility schemes, on the other hand, focus on handover latency reduction or fast packet redirection after handover. There...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.