The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A random-walk-based (RW-based) information search makes a single query or multiple queries walk around a network to search for the target information. Local navigation rules, based on which a query chooses an adjacent node to move from the current location, are important for increasing the search speed of the RW-based information search. In the present paper, we focus on degree-dependent navigation...
Larger share of total energy consumed by mobile network operators (MNOs) is wasted to ensure seamless coverage. Three to six MNOs covering the same geographical area results in even more energy waste. Division of scarce resource, i.e., spectrum into small chunks also deteriorates the overall performance. With exponential growth of the traffic and insignificant marginal revenue, it is time for the...
Recent developments in Internet technology have led to an increased importance of Software-Defined Networks (SDN). Due to advantages of this new network model that controls the network centrally, many service providers and vendors expect that traditional networks should be superseded by SDN. However, because of their centralized nature, they are vulnerable in terms of reliability and fault-tolerance...
In a cognitive radio network (CRN), a premise for two nodes to communicate is having a rendezvous which means that they switch to the same channel simultaneously. Most existing channel hopping solutions for the rendezvous problem is for a homogeneous CRN where nodes have the same type of cognitive radio and thus can sense the same spectrum. In reality, nodes have different types of cognitive radios...
To increase the communication range of multi-hop cognitive radio networks (CRNs) while avoiding the implied loss in throughput, use of incremental relaying has been suggested. In this paper, we discuss an incremental relaying (IR) protocol for cooperative multi-hop CRNs (CMHCRNs). A CMHCRN with multiple decode-and-forward relays in each hop is considered. In each hop, the relays whose received signal-to-noise-ratio...
This paper studies how to maximize the per-user-based throughput in an M-tier heterogeneous wireless network (HetNet) by optimally managing traffic flows among the access points (APs) in the HetNet. The APs in the first M − 1 tiers can use the licensed spectrum at the same time whereas they share the unlicensed spectrum with the APs in the Mth tier by the proposed opportunistic CSMA/CA protocol. The...
Significant research efforts have been put in refining concept/requirements of novel systems innovated by experts or crowds. However, there is scarce evidence of refinement techniques developed for and/or applied to the concept/requirements of novel systems innovated with participatory design. Arguably, general idea assessment and refinement techniques can be applied to participatory innovations....
Traffic monitoring and analysis has become necessary to understand the nature of information flowing within an organization. This is particularly important due to the recent trend of increase in the percentage of anomalous traffic in the overall organizational traffic composition. In this work, we attempt to determine the typical characteristics seen in various organizational network traffic. We use...
With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the software industry. A leak of critical data can cause tremendous costs in a financial, social but also political manner. For this sake, cryptographic protocols are implemented and regulate the data transfer, thus ensuring the safety of transferred...
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication...
The cloudUPDRS app is a Class I medical device, namely an active transient non-invasive instrument, certified by the Medicines and Healthcare products Regulatory Agency in the UK for the clinical assessment of the motor symptoms of Parkinson's Disease. The app follows closely the Unified Parkinson's Disease Rating Scale which is the most commonly used protocol in the clinical study of PD; can be used...
Remote attestation is used to enable verifiers to check if an underlying Trusted Computing Base (TCB) of a device and data from the TCB are trustworthy. However, the current remote attestation has limitations to be deployed in IoT from the perspective of the management in a massive and diverse collection of TCB measurements and the redundant execution of remote attestation. To mitigate these limitations,...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
The use of the Smartphones is increasing day by day and also used as an essential tool for everyday tasks. Most of the smartphone applications are used to fetch the data from the servers and transmit the sensitive user information to the server. This communication is carried on a wireless network, which is more vulnerable than the wired network. This insecure communication channel needs to be protected...
Some public and private services are called part of the Critical Infrastructure (CI), which are considered as the most important services to protect the functioning of a society and the economy. Many CIs provide services via the Internet and thus cyber-attacks can be performed remotely. It is now very simple and free to find and download software, which automates performing cyber-attacks. A recent...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
This paper proposes mechanisms to support basic, as well as conditional subscription/notification communication pattern in the Information Centric Networks (ICN), which still leverage and build on the ICN architecture and fundamental design principles with minimum change to the protocols. The proposed new interest message integrates content retrieve request, subscription and notification functions,...
In this paper, we present L-SCN, a new routing architecture for Service-Centric Networking (SCN), which makes use of a two-layer forwarding scheme composed of inter-domain and intra-domain communication. Unlike existing SCN routing architectures relying on a flat organization, our design splits the network into domains. Nodes within a domain possess significant knowledge about existing services and...
Opportunistic networks are a form of mobile ad-hoc networks that exploit users mobility to provide data sharing. Individual nodes store, carry and forward messages using direct communication between devices; no fixed infrastructure of communication is required. The final goal is to reach the totality of the participating users. The efficiency of message diffusion depends on the users' mobility, the...
Long Term Evolution Advanced (LTE-A) introduces a new feature called Proximity Services (ProSe) that enables device-to-device (D2D) communication between User Equipment (UE), including the capability to operate out-of-coverage. In order to establish a D2D communication link the UEs need to be synchronized. In out-of-coverage scenarios, the synchronization is performed in a distributed manner by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.