The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the problem of detecting the rumor source in a social network has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees. In this paper, we study the impact of an anti-rumor on the rumor source detection. We first show a negative result: the anti-rumor's diffusion does not increase the detection probability under Maximum-Likelihood-Estimator...
Detecting anomalous Border Gateway Protocol (BGP) traffic is significantly important in improving both security and robustness of the Internet. Existing solutions apply classic classifiers to make real-time decision based on the traffic features of present moment. However, due to the frequently happening burst and noise in dynamic Internet traffic, the decision based on short-term features is not...
Software Defined Networks (SDNs) provides a separation between the control plane and the forwarding plane of networks. The software implementation of the control plane and the built in data collection mechanisms of the OpenFlow protocol promise to be excellent tools to implement Machine Learning (ML) network control applications. A first step in that direction is to understand the type of data that...
The ISO/IEC 62351 standard provides a set of security controls and protocols for communications in smart grids based on the ISO/IEC 60870, 61850, and DNP3 standards. It offers the protection goals of confidentiality, integrity, and authentication. In this paper we perform a systematic study of the ISO/IEC 62351-3 standard regarding the use of public key infrastructure in smart grid communication....
Traditional flow monitoring provides a high-level view of network communications by reporting the addresses, ports, and byte and packet counts of a flow. This data is valuable, but it gives little insight into the actual content or context of a flow. To obtain this missing insight, we investigated intra-flow data, that is, information about events that occur inside of a flow that can be conveniently...
The current IPsec gateway integrates many functions of IPsec operation, tunnel management and forwarding decision, which makes the IPsec gateway complicated in maintenance and deployment. The problem of maintaining such devices prevents IPsec VPN from applying widely. The emergence of SDN provides an innovative way to decouple the control plane and data plane. In this paper, a Software-Defined IPsec...
Multiagent Systems (MAS) are used extensively in Smart Grid research as a means of developing distributed control systems comprised of a network of communicating units. Many previous works have made implicit or explicit assumptions that lead to simplified modeling and simulation of the underlying communication systems. While these assumptions are valid under some cases, they may not hold true when...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recent past have shown that even small autonomous systems (ASs) are able to manipulate routing information with huge global impact. Even though countermeasures exist, they are not established at large scale yet. Monitoring of the actual routing state is the only mean to provide at least information about...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
Searching for health-related information online can cause negative emotions such as confusion or frustration. We propose a virtual chat assistant that can answer health-related questions empathically on the basis of a doctor-patient communication model. We plan to show that our proposed assistant is not only informative but also provides the positive user experience.
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
This paper proposes a unified way of describing 5G air interface (AI) design proposals using a 5G service/frequency map based on work carried out as part of 5G-PPP/H2020 project “METIS-II”. It then crucially proposes a design framework and suitability assessment process for 5G AI candidates. The proposed assessment methodology focuses on “harmonization Key Performance Indicators, or KPIs” and how...
Wireless Sensor Networks need energy efficient protocols for communication and data fusion to consolidate data and prolong the lifetime of the network. In this paper, an adaptive hierarchical clustering and routing method has been proposed. This clustering and routing method is based on maximum bottleneck energy routing (MBER) from a node to the sink. This method favors the routes with the highest...
This paper proposes a full-featured Verification Intellectual Property (VIP) which can be used in functional verification at transaction level. The VIP includes a gold testcase set, a hierarchical testbench and a functional model. Firstly, the natural language specification is quantified and converted to the structured specification models. Secondly, the models are transformed into the codes of testcase...
In modern years we see some growth in technology and for better traffic control on road with these some technologies the moving vehicle can do the better communication in Ad-hoc network which developed a new kind of technology like Vehicular Ad-hoc Network(VANET). VANET provides wireless communication with vehicle to road side unit. VANET can perform the communication between V2V, V2I, I2I. VANET...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Wireless Sensor Networks has evoked a lot of attention in recent years as it offers a broad horizon of applications in environmental monitoring. Security of such networks is a key area of research as traditional techniques cannot be employed due to their low energy and memory constraints. The cornerstone of security primitives in cryptography is a key exchange. In this paper Elliptic Curve Cryptography...
Wireless Sensor Networks have been an active area of research owing to its myriad range of applications. Traditional security protocols are not feasible for such networks due to their resource constraint nature. However, ECC has been considered as a viable cryptographic technique due to its low computational overhead. In this paper study and application of ECC on a popular WSN operating system, TinyOS,...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.