The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
This paper proposes to detect event coverage and determines event sources. Generally, an appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s). When sensory data are collected at sink node(s), the event coverage is detected and represented as a weighted graph. Event sources are determined which correspond to the barycenters in this graph. Experiments...
Event detection is an important part in many Wireless Sensor Network (WSN) applications such as forest fire, environmental pollution. In this kind of applications, the event must be detected early in order to reduce the threats, damages. In this paper, we propose a new approach for early forest fire detection, which is based on the integration of Data Mining techniques into sensor nodes. The idea...
Wireless sensor networks (WSN) play an important role in many applications like healthcare, traffic monitoring, security, environmental and infrastructure monitoring. When designing these applications for different domains like healthcare, traffic management or military intelligence, people face a lot of challenges. Service-oriented architecture (SOA) is an emerging area in distributed computing that...
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of...
In this paper, an open-source framework for task deployment of mixed-critical and non-critical applications under dependability constraints in Network-on-Chip (NoC) based systems is introduced. This system level design space exploration is guided by a System Health Monitoring Unit which keeps a holistic view of system health status. The framework supports task clustering, mapping and scheduling of...
We focus on designing efficient flow monitoring algorithms in SDN/OpenFlow by fully exploiting all three polling mechanisms, poll-single, poll-some and poll-all. Notably, the poll-some mechanism has not been adopted by any existing flow monitoring algorithm due to the inflexible match structure standardized in the early version of the OpenFlow specification. To enable the poll-some mechanism, we need...
In the last years, several projects are emerged with the aim to addressing the challenge of providing solutions for deployment, monitoring, adaptation, and management of clouds belonging to different enterprises/organisations. In such scenarios the network connectivity is one of the key factors. SDN technologies represent a good solution to face this challenge. Separating the control plane from the...
As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the...
As network complexity and heterogeneity have increased dramatically in the last decade, modern policy-based management techniques for adaptive routing decisions regarding path selection optimization and intelligent path control are necessary. In this paper, we analyze the application performance requirements, and the event-based management options for adaptive routing. Then, we propose an innovative...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
The controller or the “control plane” is at the heart of software defined networks (SDN). As SDN migrates to wide area networks (WAN), scalability and performance are two important factors that differentiate one controller from another, and they are critical for success of SDN for end-to-end service management. We distinguish control flows from data flows, and introduce a novel dynamic control plane...
Reducing the power consumption of the internet backbone networks is one of the major challenges in computer networks because of high energy cost and environmental issues. SDN is the promising technology that enables fine grain control of network traffic. In this paper, we propose a novel traffic management and routing framework, called SDGTE (Software Defined Green Traffic Engineering), that minimizes...
In Software Defined Networks (SDN), intensive traffic monitoring is used to optimize the Quality-of-Service (QoS) of the network paths which are selected. Thus, we introduce the use of the Cognitive Packet Network (CPN) algorithm to SDN in order to optimize the search for new high-QoS paths. We install the CPN algorithm in the Cognitive Routing Engine (CRE), a new application software for SDN, and...
Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet...
After Internet routing was shown in a number of classic measurement papers to result in paths that are sub-optimal with respect to a number of metrics, routing overlays were proposed as a method for improving performance, without the need to re-engineer the underlying network. In this paper, we present SMART, a self-healing, self-optimizing and highly scalable routing overlay, which has a number of...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase the security and resilience of communication infrastructures. Despite their clear advantages, such solutions also expose ICS to common cyber threats that may have a dramatic impact on the functioning of critical infrastructures,...
Software-defined networking (SDN) envisions the support of multiple applications collaboratively operating on the same traffic. Policies of applications are therefore required to being composed into a rule list that represents the union of application intents. In this context, ensuring the correctness and efficiency of composition for match fields as well as the associated actions is the fundamental...
In recent years, due to the technological development of various kinds of drones, also known as unmanned aerial vehicles (UAVs), drones have emerged as an effective solution for a wide area of applications. In such applications, employing multiple drones promises a better way to carry out a given mission than employing a single drone. To utilize multiple drones, all drones should establish a network...
We propose a unique Dynamic Sensing Scheduling (DSS) scheme to prolong the lifetime of a sensor network. Different from most existing works, we study the sensor network lifetime under two practical requirements: sensing coverage and network connectivity. A sensor node is considered critical if its depletion of energy would cause either a violation of the sensing coverage requirement (specified by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.