The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Black-bag cryptanalysis is used to acquire the cryptographic secrets from the target computers and devices through burglary or covert installation of keylogging and Trojan horse hardware/software. To overcome black-bag cryptanalysis, the secure authentication protocols are required. It mainly focuses on keylogging where the keylogger hardware or software is used to capture the client's keyboard strokes...
In just about 4 years, IPv6 will celebrate its 20th anniversary. While the protocol itself is already quite old, its deployment has only recently picked up speed. Not so many Internet service providers offer direct IPv6 connectivity to their customers, yet. Clearly, when IPv6 is available to customers, they expect that IPv6 offers at least the same - or even better - stability of connections in comparison...
Biologically inspired pulse-coupled synchronization has received increasing attention as one of key techniques for developing decentralized wireless networks due to its inherent scalability and simplicity. While it has been actively studied in recent years, most of the previous works have focused on the synchronization only in fault/attack free networks. However, in reality, a network may have malfunctioning...
In this paper, we introduce Insistent Spectrum Sensing Data Falsification (ISSDF) as a new practical and destructive attack model aimed at distributed cooperative spectrum sensing schemes that are based on iterative average consensus. We compare various linear iteration-based and iterative gossip-based schemes in terms of primary user detection performance and convergence speed under this attack....
When packed loss caused by bit error occurs in the data transmission of IP network, one should retransmit the corrupted data to avoid information loss. However, this will take more damage for those business in which retransmission is difficult to realize or will limit the performance of system. In order to reduce this damage, this paper studied the checksum restriction mechanism of the IPv4 header...
Abrupt motion tracking has gained special attention in visual tracking community in the past several years. However, the growing interest has not been accompanied by the development of criteria to evaluate the performance of different tracking algorithms. In this paper, we introduce an evaluation criterion for abrupt motion trackers. This criterion contains a set of trials that test the robustness...
This paper describes a novel approach to convergence verification of asynchronous iterations in addition to reachability analysis of them. Asynchronous iterations are computation schemes capable of capturing all possible behaviors of distributed systems employing connectionless communication protocols such as UDP/IP. The robustness of these systems against uncertainty in packet delivery can be assured...
Unstructured P2P networks have been widely used to implement resource location systems that support complex queries semantics. Unfortunately these systems usually rely on search algorithms based on some variant of flooding, which generate a significant amount of duplicate messages. An effective way to minimize the cost of query flooding in unstructured P2P networks is the use of super-peers. On the...
Civilian Airborne Networks capable of providing network connectivity to users onboard aircraft and users on the ground may soon be viable. We propose a novel airborne network architecture consisting of commercial aircraft and ground station gateways inter-connected with Free-Space Optical Communications (FSOC) links to form a high-bandwidth mesh network. The use of directional FSOC links necessitates...
We provide the first capacity approaching coding schemes that robustly simulate any interactive protocol over an adversarial channel that corrupts any eps fraction of the transmitted symbols. Our coding schemes achieve a communication rate of 1 -- O(√ε log log 1/ε) over any adversarial channel. This can be improved to 1 -- O(√ε)...
The sensing and processing power combined with wireless communication technology makes Wireless Sensor Networks(WSN) lucrative for being exploited in abundance in days to come. However, the security of WSN remains an open challenge. One such open security challenge is the node replication attack, where the enemy captures the authentic node from the network and extracts all the security credentials...
With the development of smart grid technology, the future power system will become a complex cyber-physical system. The control and management of this system will impose new challenges to the current Supervisory Control and Data Acquisition system such as scalability in its computational and communications effort, and robustness to single point of failure. Decentralized cooperative control is promising...
Providing reliable end-to-end communication for teams of robots requires the integration of novel routing techniques, motion planning algorithms, and transport level communication protocols. In this paper we look at existing robust routing solutions that provide redundancy at the routing layer and develop the Multi-Confirmation Transmission Protocol (MCTP) to take advantage of that redundancy at the...
The use of Field Programmable Gate Array (FPGA) hardware in Test Program Set (TPS) development is highly beneficial due to its ability to be reconfigured on the fly to simulate various ATE instruments or unique signals generated from discrete hardware components. FPGA hardware can by utilized for creating an array of synthetic instruments; and by utilizing a FPGA, a single piece of hardware can be...
Network-based clock synchronization is an important prerequisite for many application areas and more and more required for the factory floor for network arbitration, control, and monitoring. Limitations of existing clock synchronization protocols are that they either support high redundancy and robustness or high precision. This paper presents an approach to integrate slave-side robustness into high...
There are currently no digital underwater communications standards. In this paper we describe JANUS, a simple multiple-access acoustic protocol designed and tested by the NATO Centre for Maritime Research and Experimentation (CMRE) over the past 6 years that provides a basic and robust tool for collaborative underwater communications. JANUS is in process to become a NATO standard but is not intended...
With the aim of achieving robust acoustic underwater communication, the paper explores different efficiency enhancements of flooding-based protocols. Pure flooding is robust but suffers from high overhead, i.e., many duplicates are sent which saturates the network. More efficient flooding-based protocols are therefore needed. For network scenarios where most of the traffic is going to one or a few...
Smart-grid-enabled transformers have unique challenges in rural settings. One such challenge is that of effective and reliable communication of data. Communication infrastructure in rural areas is often elementary and transformers should accommodate this. Communication and sensor devices installed on these smart transformers should also be reliable and robust to minimize their required maintenance...
Active measurement studies show that the Peer-to-Peer (P2P) file sharing protocol Bit Torrent is highly under attack. Moreover, malicious peers can easily exploit the original seeding algorithm and therefore reduce the efficiency of this protocol. In this paper, we propose a novel seeding algorithm that requests peers to vote for their best sharing peers. Our results show that this incentive mechanism...
The emergence of Wireless Sensor Networks (WSNs) applications such as localizing, tracking, surveillance, speedometers, and so on, synchronizing sensor motes' clocks is essential in WSNs. Thus, many time synchronization protocols are proposed in recent decade to get network wide synchronization. Each of those protocols strives to get a good precision in different ways. This paper aims to review some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.