The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated Fare Collection (AFC) systems have been globally deployed for decades, particularly in public transportation. Although the transaction messages of AFC systems are mostly transferred in plaintext, which is obviously insecure, system operators do not need to pay much attention to this issue, since the AFC network is well isolated from public network (e.g., the Internet). Nevertheless, in recent...
In Named Data Networking (NDN), data synchronization plays an important role similar to transport protocols in IP. Many distributed applications, including pub-sub applications such as news and weather services, require a synchronization protocol where each consumer can subscribe to a different subset of a producer's data streams. However, existing Sync protocols support only full-data synchronization,...
In Wyner wiretap II model of communication, Alice and Bob are connected by a channel that can be eavesdropped by an adversary with unlimited computation who can select a fraction of communication to view, and the goal is to provide perfect information theoretic security. Information theoretic security is increasingly important because of the threat of quantum computers that can effectively break algorithms...
Ideally, users in cognitive radio networks (CRNs) are capable of sensing and exploiting any potential transmission opportunities in the available spectrum band ranging from 30 KHz to 300 GHz. With the multiple-diverse-band spectrum, the network can provide more radio resources and capacity to a large number of CR users. However, the multiband scenario (e.g., TV band + 2/3G band + 4/5G band) also introduces...
In this paper, we address the fundamental problem of improving the performance of many-to-one and many-to-many communications. Our approach is Time Division Multiple Access (TDMA) based but addresses the limitations of existing TDMA implementations in a novel way. In a nutshell, we combine packets from many senders into a single large packet transmission by exploiting capture effect achieved through...
Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol...
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to the outsourced data confidentiality, we also aim to ensure the integrity of the deduplicated cloud storage. With the existing works based on Provable Data Possession (PDP)/Proof of Retrievability (PoR), we are either required to rely on a fully trusted proxy server or inevitably...
A system to control the data flow between detector sensors input streams for the data connected with a single event is elaborated. Obtained results show that a High Performance Computing cluster data exchange can be efficient AND fault-tolerant.
MmWave communications, one of the cornerstones of future 5G mobile networks, are characterized at the same time by a potential multi-gigabit capacity and by a very dynamic channel, sensitive to blockage, wide fluctuations in the received signal quality, and possibly also sudden link disruption. While the performance of physical and MAC layer schemes that address these issues has been thoroughly investigated...
The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services...
Tor hidden services make it possible to hide Internet services' location. Via so-called rendezvous circuits, Tor users can communicate with hidden services without learning each other's location. In this paper, we propose a performance-enhanced rendezvous circuit, which consists of five instead of six relays. We show that omitting the client's middle relay in a rendezvous circuit brings significant...
The GENI network testbed was designed to enable experimentation with network protocols by offering the capability to construct virtual networks at the link layer (L2). GENI users build virtual networks in their GENI slices that span resources on multiple GENI aggregates, linked by L2 network circuits from network fabric providers (e.g., Internet2). This paper summarizes new features for cross-slice...
Bluetooth Low Energy (BLE) is a low-energy personal area wireless network technology that is of increasing importance for large-scale Internet of Things (IoT) deployment. By design, BLE is localized to small regions and to simple network topologies. Moreover, it is not designed for dynamic enforcement of policy and access controls. These limitations are impediments to BLE based IoT service deployment,...
Software Defined Networks (SDNs) are a promising network architecture for future computer networks because they enable more dynamic, fine-grained control over network traffic. OpenFlow is an open standard network protocol that provides specifications for managing network traffic. Permissible (and impermissible) network flows are defined by OpenFlow policies that are translated into network switch...
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably implemented on resource-constrained smart devices to protect the privacy of communications in mobile networks. The most attractive features of this new KE protocol are provable security and lightweight. The security of this new KE protocol is based on the known impossibility of finding the unique values for variables...
Network Address Translation has often been described as an aberration in the evolution of the Internet, and one that will be removed with the completion of the transition of IPv6. This is an opinion in support of NATs, arguing that they are an important step in the evolution of the Internet and may well play a lasting role in this environment.
The increasing of device interoperability creates a new way to design smart houses and to support enhanced living environments having as main aim the increasing of quality of life. In this context more supporting platforms for smart houses were developed, some of them using Cloud systems for remote supervision and control. An important aspect, which is an open issue for both industry and academia,...
Bus is the main communication channel for processor from/to memory or external devices to deliver data or commands. Advancement, if the jobs are co-executed by the processor with multi-cores, the bus management is very important and to be depended by the arbitration strategy. In this paper, the system-on-chip insides two DLX processors, which has 32 bits and are implemented by the ARM SoC Designer...
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
Multipath TCP(MPTCP) is an experimental protocol under standardization in the IETF. It enables hosts to send data over several interfaces or paths and has use cases on smartphones, datacenters or dual-stack hosts. It has proven to increase bandwidth in these cases while remaining compatible with the existing network infrastructure and applications. However, with the popularity of Online Data-Intensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.