The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing utilization of Internet administration in the recent years has facilitated an increment in the various types of attacks. Despite the best protection measures, many attacks have been effectively done against many organization and enterprises. Anomaly detection, misuse detection are used to detect various type of attacks. Anomaly detection produce high rate of false alarms and the later...
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile...
Unmanned Aerial Vehicles (UAV) have several uses in civilians and military applications, such as search and rescue missions, cartography and terrain exploration, industrial plant control, surveillance, public security, firefight, and others. Swarms of UAVs may further increase the effectiveness of these tasks, since they enable larger coverage, more accurate or redundant sensed data, fault tolerance,...
With the increasing popularity of smart phones, location-based services became a hot topic and a great number of solutions were presented over the last years. The majority of applications are based on the idea to present location-specific information in case the smartphone user asks for it. A relatively small amount of applications are dealing with geo-notifications that are intended to inform the...
This paper presents a novel distributed Quality of Service (QoS) monitoring scheme for cellular data networks serving highly dynamic users with power- limited devices. The proposed scheme relies on candidate QoS monitoring users that can efficiently submit QoS related measurements on behalf of their neighbors. These candidate users are chosen according to their devices' residual power and transmission...
In recent years, the monitoring of End-to-End protocols from inside the mobile data network has become a powerful tool to gain insight into subscriber specific information on usage behavior and quality of experience. With the advent of big data in mobile networks, the power of statistical data analysis can now be utilized in order to answer so far untreatable questions both in the area of network...
In the latest years, we have seen a fast evolution of Internet systems and a remarkable increase of the number and variety of services required. The need of new architectural solutions has led to the creation of new tools that allow to develop more flexible and dynamic networks. Software Defined Networking (SDN) goes in this direction, offering a new way to manage networks, based on programmability,...
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion. Protocols assume that no malicious intruder node is present, which impacts all the layers by...
Anonymous communication is important and desirable in a wide range of networking systems to guarantee secure and private communications. This feature is especially important in mobile ad hoc networks (MANETs) where the communication channel is publicly open and the sessions are vulnerable to passive attacks. The fact that MANETs are mostly used in crucial environments such as military usage and disaster...
Water Distribution Systems (WDSs) are prone to events such as leaks, breaks, and chemical contamination. Continuous monitoring of WDSs for prompt response to such events is of paramount importance. WDS monitoring has been typically performed using static sensors that are strategically placed. These solutions are costly and imprecise [9] [18]. Recently mobile sensors for WDS monitoring has attracted...
In dense mobile wireless sensor networks, it is desirable to reduce traffic for data gathering as much as possible while satisfying an application requirement. In this paper, focusing on an application which monitors the time-variant shape of events, we discuss an approach to achieve an efficient monitoring with small traffic in dense mobile wireless sensor networks.
Real-time entertainment constitutes the majority of traffic in today's mobile networks. The data volume is expected to increase in the near future, whereas the mobile bandwidth capacity is likely to increase significantly slower. Especially peak hour traffic often leads to overloaded mobile networks and poor user experience. This increases costs for the mobile operator, which has to adapt to the peak...
Nowadays, mobile applications/devices have become the trends, especially, when they were gradually shifted from basic communication services to supporting more sophisticated service provisioning. Mobile applications are usually very light, are nowadays likely to be often connected to the Internet, and can be used quite easily. However, these applications exhibit some challenges related to limited...
Online monitoring of population traffic within a certain region plays a significant role in modern city administration and public security, and it is also a difficult task to fulfil using traditional methods. In this paper, a system is reported, which has realized fast estimation of snapshot population and residence time distribution within a certain region, based on mobile network signaling. The...
In rotatable and directional (R&D) sensor networks, each sensor has sector-like sensing range and rotation ability. These sensors can support temporal coverage of objects by periodically rotating to cover them. We define that an object is δi-time covered if it is covered by a sensor for at least 0 < δi ≤ 1 portion of each period. Given a set of objects where they may have different δi-time...
Understanding the Quality of Experience (QoE) of users is important for network and service providers. Many researches of QoE have been reported where subjective analysis, e.g. in the form of Mean Opinion Score (MOS), for audio/video applications and data services are performed. These studies mainly focus on how users feel while using such applications. In this paper, we focus on how users behave...
In the last years, research about context-aware systems has been particularly intense. Nevertheless, most of the proposed approaches and systems failed to flow from research to industry. In this paper we propose ANARC, a library that eases the development of network-aware applications for smartphones. ANARC does not try to cope with all the possible meanings and variations of context, it instead focuses...
Tidal Datums are utilized in the determination of littoral boundaries differentiating state owned lowlands and privately owned uplands along the Texas Coastal shoreline. The collection of water level data for the purposes of establishing these datums became critical during a dispute between the State of Texas and a private land owner. The Texas General Land Office (TGLO) in partnership with the CBI...
Tactical Mobile Ad-hoc Networks (MANETs) are widely deployed in military organizations that have critical needs of communication even with the absence of fixed infrastructure. The lack of communication infrastructure and dynamic topology makes MANETs vulnerable to a wide range attacks. Tactical military operations are among the prime users of ad-hoc networks. The military holds higher standards of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.