The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP-based Wireless Sensor Networks (IP-based WSNs) combine IPv6 technology with WSNs to create a global sensor network infrastructure. However, wireless radio access and Internet connectivity make end-to-end security urgently needed by security critical WSN applications. Transport Layer Security (TLS) is considered as a suitable solution to ensure such security. However, the certificate-based mechanism...
This paper makes three main contributions to the theory of communication complexity and stream computation. First, we present new bounds on the information complexity of AUGMENTED-INDEX. In contrast to analogous results for INDEX by Jain, Radhakrishnan and Sen [J. ACM, 2009], we have to overcome the significant technical challenge that protocols for AUGMENTED-INDEX may violate the "rectangle...
Radio frequency identification is a system to identify and wirelessly transmit the identity of an object via radio waves. These characteristics make them exceptional and broaden its scope and utility of RFID systems. Signal transmissions from multiple tags result in tag collisions or confusion causing increase in identification delay, communication overhead and unnecessary energy wastage that ultimately...
This paper presents a new data transmission protocol in Delay Tolerant Mobile Wireless Sensor Networks, which divides the data transmission process into two phases: data reception phase and data forwarding phase, mainly fulfilling through analyzing the state of mobile nodes and using Hand up mechanism. Simulation result shows that, through the implementation of two phases, we can obtain a higher message...
Finding the length of the longest increasing subsequence (LIS) is a classic algorithmic problem. Let n denote the size of the array. Simple O(n log n) time algorithms are known that determine the LIS exactly. In this paper, we develop a randomized approximation algorithm, that for any constant δ > 0, runs in time polylogarithmic in n and estimates the length of the LIS of an array up to an additive...
Radio Frequency Identification (RFID) is considered as an emerging technology for the Future Internet called the Internet of Things (IOT). It allows things and objects that embed RFID tags to be identified and to exchange information with each other. However, this new Internet is facing to some problems which are mainly related to the security of information exchange and the integration of RFID tags...
Recent aircraft include a sea of electric and electronic systems. These systems are very important to ensure right function of other systems and whole aircraft. Every electric facility needs suitable power supply unit. Because of that power supply unit is most important for electric systems, pilot of the aircraft or operator of the unmanned air vehicle need to know status of power supply unit. The...
The primary role of network access control is to decide on the validity of user's identity accepted into the networks and authorization accessed to the particular resource so that users conforming to their established access polices achieve predefined services. This paper presents a specific scenario which supports quality of service (QoS) in network domain. The QoS access rules are based not only...
The web is a crucial source of information nowadays. At the same time, web applications become more and more complex. Therefore, a spontaneous increase in the number of visitors, e.g., based on news reports or events, easily brings a web server in an overload situation. In contrast to the classical model of distributed denial of service (DDoS) attacks, such a so-called flash effect situation is not...
The widely-used Universal Serial Bus (USB) exposes a physical attack vector which has received comparatively little attention in the past. While most research on device driver vulnerabilities concentrated on wireless protocols, we show that USB device drivers provide the same potential for vulnerabilities but offer a larger attack surface resulting from the universal nature of the USB protocol. To...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless...
In this paper we present a subjective quality assessment experiment for 3D-mesh segmentation. For this end, we carefully designed a protocol with respect to several factors namely the rendering conditions, the possible interactions, the rating range, and the number of human subjects. To carry out the subjective experiment, more than 40 human observers have rated a set of 250 segmentation results issued...
This kind of control systems wherein the control loops are closed through a real time communication network can be called networked control systems. Networked control system is a new hot topic in the control engineering. The reduction of bandwidth necessitated by the communication network in a networked control system is a major concern. For this reason, a computation method of reducing the number...
Field bus technology has been widely used in vehicle electronics. For that distributed control system based on field bus can reduce electric system wiring, improve reliability, enhance information sharing, reduce repair difficulty, the application of field bus in electric drive vehicles will be the trend in future, and the time performance of field bus system will draw much attention. In order to...
In this paper, we present a solution to efficient multimedia streaming applications over P2P networks based on the foresighted resource reciprocation strategy. We study several priority functions that can explicitly consider the timing constraints and the importance of each data segment in terms of multimedia quality, and successfully incorporate them into the foresighted resource reciprocation strategy...
In this paper, we investigate the training problem of wireless local area networks (WLANs) with downlink multi-user multiple input multiple output (DL MU MIMO) capability. We extend the 802.11 MAC protocol and propose a few training protocols at the MAC layer to support DL MU MIMO. We provide a capacity analysis based on measurement results from an 802.11n systems, evaluate the overhead of these training...
In this paper, an efficient Decode-and-Forward (DF) relay selection scheme for interference-limited relaying networks is considered. In contrast to previously reported works, we consider multiple interferences which make the conventional relay selection schemes not suitable for interference-limited networks and propose a new relay selection scheme for DF protocol with multiple interferences. Approximate...
In this decade, peer-to-peer (P2P) applications have emerged as popular tools for sharing data and they have gained much attention. Such P2P applications build overlay networks on top of existing infrastructure networks and disseminate data in a peer-to-peer manner. How well the P2P overlay network maps onto the underlying physical network topology can significantly impact P2P application performances...
Many new broadband, emerging applications such as high definition 3D video streaming or on-line gaming are going to be part of the future home. Current home networks are still not capable to cope with the tight requirements asked by these kind of applications. Moreover, many underlying wired and wireless transmission technologies are available, but no solution to reach a convergent framework is available...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.