The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a position-based routing scheme called Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR). The speed up mode works together with greedy mode to provide a solution for data transmission in WSN. Unlike other variants of greedy perimeter stateless routing protocols, SU-GPSR not only embraces both still nodes and mobile nodes in one unified...
We propose a new sensor MAC protocol, called Bird- MAC, which is highly energy efficient in the applications where sensors periodically report monitoring status with a very low rate, as in structural health monitoring and static environmental monitoring. Two key design ideas of Bird-MAC are: (a) no need of early-wake-up of transmitters and (b) taking the right balance between synchronization and coordination...
Energy efficiency is likely to be the litmus test for the sustainability of upcoming 5G networks. Before the new generation of cellular networks are ready to roll out, their architecture designers are motivated to leverage the SDN technology for the sake of its offered flexibility, scalability, and programmability to achieve the 5G KPI of 10 times lower energy consumption. In this paper, we present...
Network tomography is a vital tool to estimate link qualities from end-to-end network measurements. An implicit assumption in network tomography is that observed measurements indeed reflect the aggregate of link performance (i.e., seeing is believing). However, it is not guaranteed today that there exists no anomaly (e.g., malicious autonomous systems and insider threats) in large-scale networks....
Content Delivery Networks (CDNs) are able to improve user-oriented application performance through caching and anycast routing or DNS-based user mapping mechanism. With the fact that BGP is widely used for inter autonomous system (AS) routing for CDNs, there is a middle mile bottleneck problem, which cause by the nature limitation of BGP. To solve this problem, we propose an SDN-based tunnel multi-path...
Micro-clouds infrastructures allow supporting applications on local and energy-efficient resources. Communication between micro-clouds takes place on shared and non-dedicated Internet links. Network control and optimization can only happen at the edge. For availability and persistence, the storage of application data must be geo-replicated. Maintaining strong data consistency under concurrent accesses...
Most sensor networks employ dynamic routing protocols so that the routing topology can be dynamically optimized with environmental changes. The routing behaviors can be quite complex with increasing network scale and environmental dynamics. Knowledge on the routing path of each packet is certainly a great help in understanding the complex routing behaviors, allowing effective performance diagnosis...
Boolean network tomography is a powerful tool to infer the state (working/failed) of individual nodes from path-level measurements obtained by egde-nodes. We consider the problem of optimizing the capability of identifying network failures through the design of monitoring schemes. Finding an optimal solution is NP-hard and a large body of work has been devoted to heuristic approaches providing lower...
Wireless devices such as sensors have increasingly more processing, storage, and networking capabilities, making wireless sensor networks (WSNs) get lots of attentions in recent years. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of important applications in environmental, military, commercial, health care,...
We present a showcase of our SDN-inspired facility for the Internet of Things (IoT) — the CORAL (Cross-Layer Control of Data Flows) infrastructure. CORAL provides a hierarchy of network controllers that monitor network behaviour and adapts network protocol parameters on demand. It is built on top of rich network control abstractions and is hardware-independent. Our facility offloads protocol functionality...
Attacks in Wireless Sensor Networks (WSNs) aim in limiting or even eliminating the ability of the network to perform its expected function. WSNs are networks with limited resources and often deployed in uncontrollable environments that an intruder can easily access. WSN attacks target specific network layer's vulnerabilities but normally affect other layers as well. Local sensor activity at multiple...
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterisation...
Aiming at the defects of traditional manual operation and wiring of the traditional lighting system, this paper puts forward a design scheme of LED lighting control system based on ZigBee wireless sensor network technology. With the change of the environment parameters and the preset lighting mode, the system can respond quickly and automatically, and realize the PWM linear non-polar dimming. Based...
Software-Defined Networking (SDN) benefits from the development flexibility of control-plane applications (SDN-Apps), which allows third parties to make contributions. Such flexibility may expose SDN networks to security threats, since SDN-Apps may be malicious or prone to implementation bugs. These buggy/malicious SDN-Apps may contaminate the data plane with abnormal network actions, which may not...
Wireless sensor networks (WSNs) consist of energy limited sensor nodes, which limits the network lifetime. Such a lifetime can be prolonged by employing the emerging technology of wireless energy transfer (WET). In WET systems, the sensor nodes can harvest wireless energy from wireless charger, which can use energy beamforming to improve the efficiency. In this paper, a scenario where dedicated wireless...
The Routing applications are popular in Wireless Sensor Networks (WSNs). For a practical monitoring environment, the monitoring events may be varied, and so do the data sinks. Most of known applications deal with the monitoring without varied data. The varied event and different sinks are regarded as different monitoring systems. We propose a distributed mechanism to arrange the routing for transmitting...
Underwater Wireless Sensor Network (UWSNs) have been proposed to monitor underwater regions such as seas and oceans. A typical example of an UWSN consists of a set of underwater sensor nodes and a set of sink nodes that are deployed at the sea surface. Using acoustic transmission, the sensors send their collected data to at least one of the sinks in what is known as the anycast transmission problem...
Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expose Tor users to more network-level adversaries. In this paper, we aim to mitigate and detect such active routing attacks against Tor. First, we present...
Securing Internet of Things (IoT) systems is a challenge because of its multiple points of vulnerability. A spate of recent hacks and security breaches has unveiled glaring vulnerabilities in the IoT. Due to the computational and memory requirement constraints associated with anomaly detection algorithms in core networks, commercial in-line (part of the direct line of communication) Anomaly Detection...
There are two main stages in the proposed system: Firstly includes detection and determining the number of evil paths depending on encoding an input messages by the source node by using the system of linear equations and sent these coded messages to the sink mode along the disjointed-multi-paths of the network. The sink node will construct number of equations from the received coded messages. It can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.