The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Link quality protocols employ link quality estimators to collect statistics on the wireless link either independently or cooperatively among the sensor nodes. Furthermore, link quality routing protocols for wireless sensor networks may modify an estimator to meet their needs. Link quality estimators are vulnerable against malicious attacks that can exploit them. A malicious node may share false information...
Most of the times Wireless Sensor Networks (WSNs) operate in hostile and unattended network environments, which makes the nodes vulnerable to node misbehaviour attacks. The applicability of conventional security methods, such as authentication, encryption and cryptography, to counter node misbehaviour attacks is debatable due to their incapability and involved cost. Trust aware secure mechanisms provide...
In Wireless Sensor Networks (WSNs), the efficient use of sensor energy is a crucial point to extend the network lifetime and has been the focus of many industrial and academic researchers, since it is not a trivial task. Several methodologies for clustering, routing and energy saving in WSNs are available in the literature. However, the lack of detailed and crucial information from the analyzed studies...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
An increase of vehicles in a city without an efficient infrastructure of traffic management can cause damages not only financial but also environmental and social. In order to support urban traffic system to relieve the traffic congestion and the damage caused by congestion of vehicles, in this paper, we propose a mechanism for Intelligent Transport Systems named FOg RoutE VEhiculaR (FOREVER), in...
A radial increment WSN routing algorithm(RIRA) is proposed to reduce energy consumption and improve transmission efficiency caused by complex environment and narrow tunnel of deep mine, in which the wired network layout is limited. Multi-hop routing methods between clusters can reduce energy consumption. A weighting formula is constructed to select cluster heads, the greater the weight, the more likely...
At present, the existing trust protocols and models in the trust mechanism of the wireless sensor network have several problems such as one-sided reputation assessment, avoidless malicious evaluation from the nodes, and overfull subjective factors in the evaluation process. In order to solve these problems, a Reputation Model based on Similarity Measure of Trust Value in wireless sensor networks(RMSMTV)...
In this paper, we propose a method to address the issue of link loss inference in uncertain networks. Although numerous loss inference methods have been proposed in recent years, most of them ignore the unstable states of networks. That is, the performances of real network environments, such as link loss rates and end-to-end routes, are constantly changing. Ignoring these uncertain factors of the...
This paper aims to compare several location-based routing protocols in wireless sensor networks. Although location-based routing protocols have apparent limitations, it can support multi-hop data transmission. In addition, location-based routing protocols need to consume a lot of energy to transmit location information.
Estimating the Quality of Transmission (QoT) of lightpaths is crucial for reducing provisioned margins, making optimized dynamic decisions, and localizing failures. We leverage a QoT estimation tool that uses feedback from the network in order to provide accurate QoT estimations. We propose a scheme to establish active monitoring lightpaths (i.e., probe lightpaths used only for monitoring purposes)...
Network on Chip (NoC) has emerged as an interconnection solution for the modern digital systems, especially for System on Chip (SoC), due to the large number of IPs in the system that need to communicate. Various systems and routers have been introduced; hence the need to make a reusable verification environment to test both single routers and networks. In this paper, we propose a reusable verification...
In this paper we introduce the SDNRoute system which aims to support routing decisions in Software Defined Networks. Such a system is especially important in the context of the SDN as this concept makes it possible to perform routing in a dynamic and elastic manner. We focus on the SDNRoute architecture and research challenges that must be investigated to develop the system. Additionally, we provide...
Software-defined networking (SDN) simplifies the forwarding devices by introducing a centralized controller. The controller calculates routing rules for the whole network and the forwarding devices cache the routing rules. This working process leads to the new-flow attack. When malicious packets with different headers arrive at the network, they are treated as new flows. These useless flows consume...
In order to integrate a large number of distributed energy resources in distribution grids a robust decentralized information and communication control structure is required. This paper proposes an overlay peer-to-peer (P2P) architecture for controlling and monitoring microgrids in real time, which has a great capacity of adaptation to the demanding network requirements of these environments. The...
Load balancing is the salient problem in data stream processing systems and also in complex event processing systems. And the imbalance in operational workers becomes extremely apparent as the scale is up with more workers and skewed datasets. In this paper, we find out that the upstream skewed sources can also exacerbate the load imbalance in the downstream workers and this bottleneck cannot be handled...
In wireless sensor networks, Intrusion Detection through sensor monitoring allows locating intricate security attacks like denial of service and routing attacks. Nevertheless, the monitoring process observing sensors behavior can induce an important energy and bandwidth overhead. Furthermore, the monitors can be attacked and their observations would be corrupted. In this paper, we propose an adaptable...
Source location privacy (SLP) is an important property for the class of asset monitoring problems in wireless sensor networks (WSNs). SLP aims to prevent an attacker from finding a valuable asset when a WSN node is broadcasting information due to the detection of the asset. Most SLP techniques focus at the routing level, with typically high message overhead. The objective of this paper is to investigate...
Network load-balancers generally either do not take application state into account, or do so at the cost of a centralized monitoring system. This paper introduces a load-balancer running exclusively within the IP forwarding plane, i.e. in an application protocol agnostic fashion - yet which still provides application-awareness and makes real-time, decentralized decisions. To that end, IPv6 Segment...
It has become increasingly important for content providers (CPs) to reach consumers with low latency. Peering links that connect CPs directly to access Internet service providers (access ISPs) have been used for this purpose thus providing one-hop AS paths from CPs to users. While providing improved latency, these peering links still do not give CPs control over the entire end-to-end path to their...
While many institutions, whether industrial, academic, or governmental, satisfy their computing needs through public cloud providers, many others still manage their own resources, often as geographically distributed datacenters. Spare capacity from these geographically distributed datacenters could be offered to others, provided there were a mechanism to discover, and then request these resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.