The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a set of protocols for creating a secure processing tree used for completing a task without divulging critical information. We analyze the information that is exchanged during the protocols and the effect of compromising participants.
Resilience is an essential property for critical networked environments such as utility networks (e.g. gas, water and electricity grids), industrial control systems, and communication networks. Due to the complexity of such networked environments achieving resilience is multi-dimensional since it involves a range of factors such as redundancy and connectivity of different system components as well...
A wireless ad hoc network (WANET) is an effective approach to disseminating digital content without the need for infrastructure networks. It is not only useful in the absence of commodity connections such as cellular networks, but also useful for avoiding overloading those connections in crowded scenarios, an example of which is delivering movie clips throughout spectators in a stadium. However, experiments...
Some of the most advanced functions in automated vehicles are in the parking domain, since it provides structured environments and slow speeds. As most parking garages deny GNSS reception, vehicles rely on dead reckoning or simple path-finding algorithms. To this regard, we have developed an infrastructure-based positioning system using cameras. In this paper, we present a novel approach on how to...
By exchanging the information on the status and the surrounding environment between devices, devices can determine the optimal action. We focus on the construction of a digital signature scheme for local broadcast, which allows the devices with limited resources to securely transmit broadcast messages. A multi-group authentication scheme that enables a node to authenticate its membership in multi...
Hopper and Blum suggested a human authentication protocol (HB) for unaided humans based on shared secrets. It does not require specialized hardware or software and it works based on learning parity with noise. Evidently both human and the low cost pervasive devices cannot perform cryptographic authentication as they have inherent resource constraints. The human computer security can be used for pervasive...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
This paper reports an organized suite of experiments comparing a parallel matrix program in performance and reliability using a single-sided statistic multiplexed computing framework against MPI based on end-to-end computing framework.
We present the architecture and partial proof of concept implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP). It is intended to improve network security and performance by exerting much greater control over how ARP traffic flows through the network as well as over what actually delivers the...
The Controller Area Network (CAN) is a broadcast communications network invented by Robert Bosch GmbH in 1986. CAN is the standard communication network found in automobiles, industry equipment, and many space applications. To be used in these environments, CAN is designed for efficiency and reliability, rather than security.
This paper deals with an extended framework of the distributed asymptotic agreement problem by allowing the presence of unilateral interactions (optimistic or pessimistic) in place of bilateral ones, for a large class of nonlinear monotone time-varying networks. In this original setup we firstly introduce notions of unilateral optimistic and/or pessimistic interaction, of associated bicolored edge...
Due to resolving the key escrow problem and public key authentication problem, certificateless public key cryptography has drawn many attentions from numerous scholars and experts in recent years and becomes a hotspot for cryptography research. Most recently, the scholars of He and Du proposed a forward secure certificateless proxy blind signature scheme. Through the security analysis on the forward...
Today's wireless network is characterized by fixed spectrum assignment policy, which is known as licensed spectrum. But this licensed spectrum is not utilized properly and on the other hand due to enormously increase in wireless devices there is a problem of spectrum shortage. So a new technology, cognitive radio network (CRN) has been proposed by Mitola(2000) for efficient utilization of available...
GPS-enabled mobile devices such as smart phones and tablets are extremely popular today. Billions of such devices are currently in use. The application and research potentials of these devices are limitless, but how accurate are these devices? The research team used Average Euclidean Error (AEE), Root Mean Square Error (RMSE), and Central Error (CE) to define and calculate the accuracy and precision...
Closely coupled CPU and GPGPU system with the shared last level cache (LLC) enables fine-grained data exchange. However, traditional data exchange causes unnecessary LLC misses and degrades the entire system performance. We believe that the cache organization is not suitable for the temporary data exchange in the closely coupled system. We analyze the memory access pattern and discover the inefficiency...
Decentralized Continuous Double Auctioning offers a flexible marketing approach to power distribution in resource constrained (RC) smart micro-grids. Grid participants (buyers and sellers) can obtain power at a suitable price both at on or off-peak periods. Decentralized CDA schemes are however vulnerable to two attacks, namely - 'Victim Strategy Downgrade' and 'Collusion'. Both attacks foil the CDA...
We present a distributed and asynchronous versioning mechanism (DAVM) in this paper to identify consistent replicas for each encoding block in BW-RAID, which uses "mirroring and RAID4" encoding scheme to improve the system performance and disk space utilization. DAVM has three advantages: Firstly, it is distributed and asynchronous in management. Secondly, it is correct and workable in any...
By using a data-driven communication pattern other than location-driven pattern, Named Data Networking (NDN) offers better support for content distribution applications such as video playback application. We propose NDNlive, which exploits the features of NDN to stream live and prerecorded video captured by the camera to multiple players. Instead of fixed-size segmentation, NDNlive chops video stream...
The Internet has evolved greatly in this decade. For economic benefits, the management of Internet networks needs to adapt to mass changes without huge modifications in hardware and software. Especially in campus networks, there are a variety of users and devices with different Quality of Service (QoS) requirements and management policies. Software-defined networking (SDN) decouples the data and control...
Software security for critical infrastructure, such as electrical grid and SCADA systems is becoming an increasing important issue. Fuzzing techniques are widely used to detect software security vulnerability, from various approaches (mutation-based or grammar-based, blackbox or whitebox) depending on the information used to generate test input. Although existing studies have advantages, they also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.