The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The...
The smart transformer is a solid state transformer with advanced control functionalities that can efficiently manage a low-voltage micro-grid by also supporting the medium-voltage grid. Cascaded H-bridge (CHB) converters proved to be a suitable option to realize the MV stage of the smart transformer due to their modularity and multi-level output. Normally the power is equally split among the CHB cells,...
Using AS-level Internet topology maps to determine accurate AS-level paths is essential for network diagnosis, performance optimization, reliability improvement, resiliency enforcement and topology-aware application development. One significant drawback that we have observed in many studies is simplifying the AS-level topology map of the Internet to an undirected graph, and then using the hop distance...
Underwater Acoustic Networks (UANs) are widely used in various applications such as climate change monitoring, pollution control and tracking, tactical surveillance and offshore exploration. However, limited consideration is given to the security of such networks, despite the fact that the unique characteristics of UANs make these networks vulnerable to various malicious attacks. In this paper, we...
The trends for smartphone and other mobile devices are more than ever for integration and lower cost. Meanwhile, a higher degree of functionality and performance, thinner profile, and longer battery life are some of the additional market drivers seen in these devices. The implications of these market drivers on the packaging content of mobile devices including internet of things (IoT) and wearable...
It does not seem easy to generate reliable routes in Vehicular Ad-hoc Networks (VANETs) because of frequent link failures caused by vehicle's mobility. In this regard, we analyze the characteristics of topology-based routing protocols in order to assess the feasibility of each protocol for vehicular environments. We plan to design an efficient routing protocol for VANETs in order to generate reliable...
The area of wireless sensor network (WSN) being alluring among community of researchers finding it to be diverse for instance defence security, civilian applications & medical research. Issues of routing in WSN for the sake of usability in computationally constrained and resource constrained micro sensors are complex. Aforementioned coercion hinder line-up of conventional networking system devised...
For data center networks (DCNs), it is very important to perform multicast transmission reliably. However, due to packet loss in DCNs, not only the reliability of data transmission should be guaranteed, but also the network throughput should be maintained stably. To this end, in this paper, we design a multicast fat-tree data restoration strategy (MRDC). The advantage of MRDC is that it can haul back...
Mobile Ad Hoc network works in hostile environment in absence of central control. Malicious or low energy nodes may degrade performance and also affects lifetime of the network. Broadcasting method which is commonly used for maintaining connectivity causes high overhead on the network. So it is necessary to exclude malicious and low energy nodes from the network and reduce the overhead. The proposed...
With the increasing development of technologies and reducing costs of materials, satellite networks have been widely investigated both on demand and supply for many years. Multi-Path routing has been applied as an effective method to support end-to-end reliability. But there exist inter-satellite links loss and long end-to-end delay in current multi-path routing due to much frequency of route request...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
The acoustic environment suffers from a number of impairments which effect transmitted data reliability and integrity leads toward low-quality routing. Integral part of cooperative routing is reliable data delivery with trade-off energy consumption is high, because of multiple transmissions. In order to overcome this problem and getting advantage of cooperation routing, we proposed a scheme Sink Mobility...
Cooperative Beamforming is a flourishing technique to resolve many issues related to Cognitive Radio Networks. One of them is to overcome the problems caused by failure of several nodes in a network. In case of node failures, the optional paths are selected instead of intended paths which may cause additional delay. This work suggests a route conservation protocol with minimal changes in a basic routing...
Vehicular Adhoc Networks (VANETS) enable the vehicles to communicate with each other as well as with road side units. But developing an efficient routing for these networks potentially due to the large mobility and regular changes in these networks is a challenging job. In VANETS transmission links are at the risk of disconnection. Thus the development of the efficient routing mechanism is needed...
Multipath interference or route coupling is a severe issue in multipath routing schemes of wireless sensor networks. Due to that, quality of data transmission is impossible in wireless sensor network (WSN) or heterogeneous wireless sensor network (HTWSN). Multipath routing is having many features over single path routing, but it is highly prone to multipath interference. The existing multipath routing...
With the rise of drones, providing a strong connectivity to the drones has become an indispensable part. Especially when the multiple drones are deployed, communication among each drone and a ground control station (GCS) is essential for delivering control message. However, traditional routing algorithms take too long time to construct routing table (eg. proactive routing protocol) or require large...
Vehicular ad hoc network (VANET) is suffering from the frequent link breakage and low packet delivery rate, which challenges routing protocols. To address this issue, we propose a Geographic Opportunistic Routing protocol based on Link state and Forwarding quality inside nodes (LF-GOR). We first put forward a hybrid approach of filtering and prioritizing to determine a candidate nodes set of the sending...
This paper proposes KAR (Key-for-Any-Route), a new intra-domain resilient routing system in which edge-nodes set a route ID to select any existing route as an alternative to safely forward packets to their destination. In KAR routing system, a route is defined as the remainder of the division between a route ID and a set of switch IDs along the path(s) between a pair of nodes. KAR-enabled switches...
Mobile ad hoc networks (MANETs) are emerging as a practical technology for emergency response communication in the case a centralized infrastructure malfunctions or is not available. Using smartphones as communication devices, MANETs may be readily established among the civilian population of affected areas. Beneficiaries would be civilian first responders, which may form small collaborating groups...
As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.