The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
The ubiquitous adoption of portable smart devices has enabled a new way of communication via Pocket Switched Networks (PSN), whereby messages are routed by personal devices inside the pockets of ever-moving people. PSNs provide opportunities for various interesting applications such as location based social networking, geolocal advertising, and military missionsin active battlefields where the central...
Static Wireless Mesh Networks (WMN) based on high capacity pencil-beam millimeter wave (mmWave) links offer an attractive solution for small cell backhauling in 5G networks. However, the delay targets in 5G are such that it is quite challenging to develop adequate link scheduling and routing mechanisms. Furthermore, the susceptibility of mmWave radio links to adverse weather conditions and other obstructions...
This paper proposes PBRR and Blowfish algorithms to achieve three factors in one dimensional (1-D) queue network. These factors are network lifetime, increased packet delivery ratio and average residual energy. Network lifetime is defined as amount of time the nodes are awake in the network. Packet delivery ratio is defined as ratio of number of packets received by destination to the number of packets...
The model of indirect trust value is done further research in statistics principle and a new model of trust value is proposed. On this basis, the electoral method of cluster node is studied, and then a routing algorithm is given based on considering the trust value, the density, the distance between nodes and the forward capability. Experiment and simulation results show that the established trust...
Electromigration (EM) effects are a high concern in power delivery networks where the current flow is unidirectional. As the integrated circuits (IC) technology nodes become smaller, the EM effects become a critical reliability failure mechanism also on signal nets. Such effect is also known as AC electromigration. This work presents a design strategy using special signal non-default routing rules...
This paper presents the design, fabrication, assembly, and characterization of a fully-integrated single-chip glass BGA package at 40/80 µm off-chip I/O pitch with multilayered wiring and through-package-vias (TPVs) at 160 µm pitch. The designed test vehicle emulates an application processor package for smart mobile applications, and enables for the first time measurements of DC signal transmission...
With the ever-increasing emphasis on the importance of vertical integration for the fourth industrial revolution (Industrie 4.0), we contend that the largest potential lies in the replacement of single-purpose gateway-ing solutions with distributed gateway service bus (GSB) technologies. Within this paper, we primarily focus on the aspect of routing between variously grouped GSB components. We base...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase the security and resilience of communication infrastructures. Despite their clear advantages, such solutions also expose ICS to common cyber threats that may have a dramatic impact on the functioning of critical infrastructures,...
Physical Unclonable Functions (PUFs) are a promising way to securely generate and store keys by using the inherent process variations of each chip as a source of randomness. One of the most promising PUFs for FPGAs is the Ring-Oscillator (RO) PUF. In this paper we take a closer look at RO PUFs and their open challenges. Starting from a reference design for a Spartan-6 FPGA based on PUFKY, we show...
Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose...
This work presents a new EDA flow that aims to increase the design robustness versus transient errors when the dynamic reconfigurable computing paradigm is adopted. In brief, we propose a modification of the existing commercial tool-chain flow to make transient error aware designs. Aiming at that scope, a new algorithm for the design mapping has been developed reducing Single Event Upsets on the routing...
Three-dimensional (3D) integration provides the benefits of better performance, lower power consumption, and increased bandwidth through the use of vertical interconnects and 3D stacking. The vertical interconnects enable the design of a high-bandwidth and energy-efficient small-world (SW) network-based 3D network-on-Chip (3D SWNoC) for massive multicore platforms. However, the anticipated performance...
In challenged networks, such as opportunistic networks or Delay Tolerant Networks (DTNs), due to frequent network partition an end-to-end connection between source and destination may not always be possible due to nodes move unpredictably with high speeds. For such type of networks, traditional routing protocols fails to transmit and also no guarantee on delivery of data to specified destination because...
By saving network traffic and improving application throughput, Multicast becomes a pervasive traffic pattern in data centers. Reliable transmission is an important requirement in Modular Data Center. In this paper, we proposed a reliable multicast approach for EBSN, a modular data center structure. For efficient transmission, multiple multicast trees were constructed. To realize reliable, we chose...
Industrial Wireless Sensor-Actuator Networks (WSANs) enable Internet of Things (IoT) to be incorporated in industrial plants. The dynamics of industrial environments and stringent reliability requirements necessitate high degrees of fault tolerance. WirelessHART is an important industrial standard for WSANs that have seen world-wide deployments. WirelessHART employs graph routing to enhance network...
Using wireless communication instead of laying cables promises high cost savings in many applications. Motivated by the intended deployment of wireless networks in solar tower power plants with up to hundreds of thousands of possible clients, this research shall explore the limits of large-scale wireless networks. Apart from the pure number of supported clients, maintaining reliability and time-bounded...
Social connections among network users have been well investigated as an additional opportunity in network design, such as in routing strategies and trusted networking. This paper presents a paradigm shift that explores the design and performance analysis of combining social links jointly with communication links to support message delivery in wireless networks. In a combined social and communication...
Determining an accurate and reliable prediction of the optimal routing paths between source and destination nodes in Mobile Adhoc Network (MANET) is always challenge due to dynamic nature of mobile nodes and the scarcity of network availability. The purpose of this work is to identify reliable optimal paths (ordered) from the set of possible random routing paths. The proposed model leverages fuzzy...
This paper considers the reliable delivery of sensor data from Internet of Things (IoT) devices to distributed cloud service instances in the face of localized failures for event detection, community infrastructure management, and emergency response. We develop and explore the notion of GEOgraphically Correlated Resilient Overlay Networks (GeoCRON) to capture the localized nature of community IoT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.