The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this position paper, we define the SISSY challenge and explore what it might mean for the usual expected integrations and for the more difficult unexpected integrations.
We propose new mathematical models of splitting attacks targeted at two major consensus protocols applied in cryptocurrencies. Obtained upper bounds of probability of successful fork maintenance by an attacker allows to get estimates on block expectation number for securing the system against splitting attacks.
Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we propose a new pattern. In this tutorial, we will show participants a new design pattern for designing and implementing parsers using this new method....
In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple. However, such fragmentation of IoT platforms has made the development of IoT applications very difficult...
Integrating different radio access technologies (RATs) is one effective method to meet the demand to provide ever increasing data rates to the users. For integrating LTE and WLAN in particular, the purpose is to enhance the operators control of when the UE uses WLAN. Another aim, in addition to better network control on which RAT is used, is the possible data aggregation which enables simultaneous...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
Door phone systems, allowing occupants of a building to communicate with visitors at the door, have evolved over the years, with the current advancements being a fully internet protocol (IP) based solution. In order to adopt newer IP based solutions, current analogue systems can be replaced, yet this may be costly and cumbersome, especially in a conventional multi-occupant building. We therefore propose...
With the development of automated lighting systems, accent lighting is undergoing a major transformation with the adoption of LED light sources. Movable spot luminaires are generally used for their beam effect and the ability to project texture. Spot luminaire units are controlled in many ways. This paper focuses on using DALI (Digital Addressable Lighting Interface) for controlling light and motors...
This study investigates how genetic programs can be effectively used in a multi-agent system to allow agents to learn to communicate. Using the pursuit domain and a co-operative learning strategy, communication protocols are compared as multiple predator agents learn the meaning of commands in order to achieve their common goal of first finding and then tracking prey. The outcome of this study reveals...
In recent technological advancement such as smart grid applications, security surveillance & border protection, internet of things, disaster management & other smart home applications exhilarate the deployment of autonomous, self-configured, large-scale wireless sensor networks. Efficient power conservation is crucial concerns for sensor networks to operate in the hostile environment. Therefore...
In this paper, a novel two-phase orthogonal frequency division multiplexing-index modulation (OFDM-IM)-aided cooperative relaying protocol is proposed for overlay cognitive radio (CR) networks, where the primary and secondary networks work concurrently over the same spectrum band. In the proposed scheme, OFDM-IM technique is used at the secondary user (SU) to split the transmission space into the...
To realize a consensus problem based on wireless communications, it is necessary to consider several constraints caused by the natures of wireless communications such as communication error, coverage, capacity, multi-user interference, half-duplex and so on. This work focuses on half-duplex constraint and multi-user interference for a consensus problem and proposes a new Slotted-ALOHA that changes...
In order to achieve better network communication between embedded devices, we complete a network driver program based on embedded processor platform. In the definition of internal data type, We choose little-endian due to our processor and use LwIP build-in error code in arch.h file. Moreover, LwIP provides users with a convenient configuration at the beginning of its design. Additionally, in order...
With the fast development of embedded Web, the needs of communication between different embedded devices through Internet become increasingly intense. Taking application requirements into account, we utilized a customized embedded 32-bit processsor as the hardware platform which contains a MAC module. On this basis. We design the protocol layer network interface and a network driver based on descriptor-based...
Low-Power Wide-Area networks promise to deliver limited IoT payloads reliably at distances in excess of 10 km raising the possibility of thousands of IoT devices connected to a single base station. PlanIt is a web application able to visualize connectivity in these large-scale deployments prior to deploying hardware or even making a single signal-strength measurement. DQ-N is an adaptation of distributed...
Recent years have witnessed a growing popularity of file synchronization systems. In this paper, we take a first step towards the understandings of a new Peer-to-Peer file synchronization system, Resilio Sync. Our real-world measurement identifies its unique features and reveals its potential fairness issues
In this paper we present a new approach to implementing causal consistency in geo-replicated data stores, which we call Optimistic Causal Consistency (OCC). The optimism in our approach lies in that updates from a remote data center are immediately made visible in the local data center, without checking if their causal dependencies have been received. Servers perform the dependency check needed to...
Groups of strongly consistent devices can efficiently order events under ideal (data center) conditions, but become less effective in dynamic and heterogeneous environments. Weakly consistent devices efficiently tolerate both faults and dynamic conditions but are slow to converge on a single ordering of system events. We propose "federated consistency", which combines the strengths of both...
We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the big data trading environment, our protocols achieve book-keeping ability and accountability against dishonest consumers who may misbehave throughout the dataset transactions. Specifically, we study the responsibilities of the consumers in the dataset trading and design AccountTrade...
Trust in SSL-based communications is provided by Certificate Authorities (CAs) in the form of signed certificates. Checking the validity of a certificate involves three steps: (i) checking its expiration date, (ii) verifying its signature, and (iii) ensuring that it is not revoked. Currently, such certificate revocation checks are done either via Certificate Revocation Lists (CRLs) or Online Certificate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.