The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However,...
The Department of Homeland Security Cyber Security Division (CSD) chose Moving Target Defense as one of the fourteen primary Technical Topic Areas pertinent to securing federal networks and the larger Internet. Moving Target Defense over IPv6 (MT6D) employs an obscuration technique offering keyed access to hosts at a network level without altering existing network infrastructure. This is accomplished...
Door phone systems, allowing occupants of a building to communicate with visitors at the door, have evolved over the years, with the current advancements being a fully internet protocol (IP) based solution. In order to adopt newer IP based solutions, current analogue systems can be replaced, yet this may be costly and cumbersome, especially in a conventional multi-occupant building. We therefore propose...
Smart IoT applications require connecting multiple IoT devices and networks with multiple services running in fog and cloud computing platforms. One approach to connecting IoT devices with cloud and fog services is to create a federated virtual network. The main benefit of this approach is that IoT devices can then interact with multiple remote services using an application specific federated network...
Cloud Control System is proposed based on Cloud Computing, Networked Control System and Internet of Things. It inherits the “3C” (Computing, Control and Communication) from Cyber-physical System and provides powerful ability of data storage and processing to serve control system. It is getting popularity day by day in the modern CS architecture, because of its ground breaking future applications....
Software-defined networks (SDN) are vulnerable to most of the attacks that traditional networks are vulnerable to. In addition, SDN has introduced new vulnerabilities through its unique architecture such as those related to the southbound and northbound controller interfaces. In this paper, we introduce a lightweight flow-based Intrusion Detection System (IDS) that periodically gathers statistical...
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing...
Cognitive radio is an emerging technology that has been under heavy research in the recent years, as it is considered to be a promising solution for the spectrum scarcity problem. In the European Defense Agency's project Cognitive Radio for Dynamic Spectrum Management (CORASMA) a high precision cognitive radio simulation environment was developed based on an artificial UHF waveform. Target of that...
The next generation networks is based on packet switching which involves voice, data and multimedia such as audio and video. It provides fixed mobile convergence to all valued customers. The 8 core exchanges in India is now commissioned and about 136 core switches have started to work. The BSNL has planned a huge network wherein all the traditional voice and data customers migrate from C-Dot TDM towards...
The current IPsec gateway integrates many functions of IPsec operation, tunnel management and forwarding decision, which makes the IPsec gateway complicated in maintenance and deployment. The problem of maintaining such devices prevents IPsec VPN from applying widely. The emergence of SDN provides an innovative way to decouple the control plane and data plane. In this paper, a Software-Defined IPsec...
Tactical Edge Networks provide one of the most challenging communication environments. In order to cope with node mobility, constrained resources, and link unreliability, communication solutions designed for Tactical Edge Networks typically present highly configurable interfaces to be adaptable for various networking conditions. However, the extreme dynamicity and heterogeneity of tactical scenarios...
The Internet Protocol (IP) is ubiquitous in terrestrial and electromagnetic-carrier wireless networking. However, for very low-throughput underwater links (such as those using acoustic modems) the IP header introduces an unacceptable amount of data overhead for the small maximum transmission units available on underwater acoustic links. Nonetheless, it is becoming increasingly valuable to connect...
Now, SDN (Software Defined Networking) has been accepted as an unavoidable networking architecture since the ONF (Open Networking Forum) foundation, the release of Google's B4 project, and several respective deployments of cloud and transport SDNs. In addition, SDN has been investigated for a basic networking infrastructure for the 5G/IoT's era and an integration between SDN based cloud and transport...
For the safe control of Unmanned Aerial Vehicle (UAV), a reliable communication link is very important, so a Control and Non-Payload Communication (CNPC) standard is progressing in Radio Technical Commission for Aeronautics (RTCA) [1][2]. The CNPC standard of RTCA only includes the physical layer specification, so a network architecture and upper layer protocols are required for the CNPC network deployment...
The Locator/Identifier Separation Protocol (LISP) was specified a few years ago by the Internet Engineering Task Force (IETF) to enhance the Internet architecture with novel inbound control capabilities. Such capabilities are particularly needed for multihomed networks that dispose of multiple public IP routing locators for their IP networks, and that are willing to exploit them in a better way than...
VoIP aims to provide safe, high efficient and low cost voice communications. It can even offer more comprehensive and quality services than the traditional telephone. Soft-Switch has the characteristics of simplicity, openness and flexibility. This paper advocates the VoIP voice communication system based on Soft-Switch. For its implementation we design and analyze the overall structure of the system...
The default gateway protection scheme in fault-tolerant IP routing is proposed in the given paper. In solving the technological problem of the fault-tolerant IP routing, it is necessary to solve either mixed integer nonlinear programming problem during minimization of the object function, or nonlinear programming problem with limitations defined. The proposed model also provides the support of load...
ENUM (E.164 Number Mapping) is widely used to provide automatic mappings between the telephone numbers and the VoIP (Voice over IP) URIs (Uniform Resource Identifiers). With ENUM, the subscribers dial the telephone number of the called party and the system automatically forwards the call through IP networks if the VoIP URI of the call is found. Typically, the ENUM query process is performed at the...
A computer has become possible to operate more services by improving the performance. Therefore, there is a growing tendency to aggregate a single computer. In consequence, a virtualization technology such as VM (Virtual Machine) is receiving a lot of attention.
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.