The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Time synchronization is very important in the IEEE802.15.4e network which aim to industrial automation applications. It enabled high end-to-end reliability and low power wireless networking. If an adversary launches time synchronization attacks to the IEEE802.15.4e networks, the whole network communications will be paralyzed. In this paper, we present two types of attacks: 1) ASN and 2) time synchronization...
Nowadays, mixed wireless and wired networks are used everywhere in everyday life, including in industry where they often support time-critical applications. Industrial applications with high precision requirements are subject to real-time constraints, and thus one of the main assets, regardless of application area, is clock synchronization. Considering such networks, synchronization is the first thing...
Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under...
Time synchronization is very important in many sensor network applications especially in industrial wireless network. If an adversary launches time synchronization attacks to the industrial wireless networks, the whole network communications will be paralyzed. However, the time synchronization is not insufficient to be protected in the current industrial wireless standards which based on IEEE802.15...
Security is a critical success criterion for implementation and operation of Smart Grids at any scale. In this paper I describe the status and specifics of Smart Grids where data communication and automation networks are integrated with the power grid. Increased connectivity in order to achieve higher flexibility, visibility and better control presents many benefits. On the other hand, increased connectivity...
Wireless networks have made their mark in higher educational institutes worldwide. The authors have conducted a web-based survey to investigate various aspects of wireless networks in higher education institutes around the world. This paper discusses the findings of the survey results in higher education institutes worldwide. Thirty-six higher education institutes participated in this survey. Three...
Automotive networking on US highways is moving into high gear. Smart cars, connected vehicles, intelligent transportation systems (ITS), vehicular ad-hoc networks (VANET), and vehicle telematics represent parallel and overlapping technologies and services that will define the future of the American roadway systems. The integration of computing technology and expanding communication services is driving...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
In order to encapsulate data and to convey information more efficiently and more security, a draft frame based on active block ciphers for application layer of Internet which could transmit orange data into semantic security and semantic integrity was designed according to scalable purpose. To different network environment, there were different intelligent choices about block cipher algorithms to...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Wireless sensor networks consist of a large number sensors spread across a given geographical area. Each sensor has its own communication capability as well as certain level of intelligence for signal processing and networking. As the sensor nodes are densely populated, communication range requirement for these nodes is smaller. After signal detection, a number of sensor nodes communicate over the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.