The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Criminal activity in the Internet is becoming more sophisticated. Traditional information security techniques hardly cope with recent trends. Honeypots proved to be a valuable source of threat intelligence. In this work several Honeypots are combined into a Honeynet and observed exploitation attempts. The Honeynet consists of six Honeypots and was operated for 222 days. 12 million exploitation attempts...
In this paper, we explore the concept of flow-based load balancing of network traffic on multi-homed hosts. In contrast to existing approaches such as MPTCP, our approach is a client-side-only solution, and can therefore easily be deployed. We specifically explore flow-based load balancing for the web traffic use case. Experimental evaluations of our OpenFlow-based load balancer demonstrate the potential...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
Energy hole is regarded as one of the challenging issues in wireless sensor networks (WSNs). According to this problem, nodes that are closer to the sink lose their energy earlier than other nodes. Consequently, it leads to the early breakdown of the network. One approach for preventing this problem is to use mobile sink rather than one or more sinks with fixed positions. Also, using fuzzy logic and...
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
Bitcoin is a peer to peer electronic payment system where payment transactions are stored in a data structure named the blockchain which is maintained by a community of participants. The Bitcoin Core protocol limits blocks to 1 MB in size. Each block contains at most some 4,000 transactions. Blocks are added to the blockchain on average every 10 minutes, therefore the transaction rate is limited to...
Recent proposals enhances Wireless Sensor Networks (WSNs) with Software Defined Networking (SDN) practices, introducing new innovative network control strategies and protocols based on a central control logic, i.e., enabling WSNs as crucial facilities for the Internet of Things (IoT). In this direction, we demonstrate CORAL-SDN, an SDN solution for WSNs which: (i) uses intelligent centralized control...
This paper proposes an asynchronous cycle circuit by providing Click element and joint module rather than clock-domain. The asynchronous mode of operation re-uses the simple asynchronous control protocols, takes full advantage of characteristics of Click, and commendably inherits the elasticity of the asynchronous micropipeline. The circuit in this paper has some individual coin. As a result, we can...
Present research work propose the design of a low energy and high throughput, hierarchical clustering based routing protocol for smart home sensor network application. Proposed protocol perform dynamic cluster head selection based on multiple node characteristics like node residual energy, node distance from sink and node average distance from neighbour nodes. Cluster head distribution is even and...
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However,...
This paper presents a secure protocol for authenticating Electronic Control Units (ECUs) in the Controller Area Network (CAN) bus and establishing session keys between them. These keys are used to introduce message source authentication for the CAN network. Our method is based on the elliptic curve cryptography (ECC) which is more suitable for embedded systems where computational power and memory...
The latest experiences hint that the QoS (Quality of Service) approaches adopted by IMS (IP Multimedia Subsystem) technologies are still suffering from a primary containment factor due to the nondifferentiation between IPTV (Internet Protocol Television) video components. The success of IPTV services depends on how the customer perceives QoS related to the provided stream. The satisfaction of this...
The Japanese government aims to introduce completely autonomous vehicles by 2030. Autonomous vehicles are expected to reduce the number of accidents and traffic jams. However, incomplete exchange of yielding intention between human-driven vehicles and computer-controlled autonomous vehicles, which will run on same roads, may lead to accidents or traffic jams. This paper proposes a system that enables...
Diseases such as enteric fever continues to be major cause of deaths globally, particularly in poor resource settings. Traditional cell viability test using bacterial culture method followed by confirmatory biochemical tests such as motility, triple sugar iron agar (TSI), citrate, urease test, agglutination tests, forms the gold standard method for diagnosis of enteric fever. However, these existing...
Monitoring gait patterns seamlessly and continuously over time provides valuable information that could help physicians diagnose diseases in the early stages. Currently, traditional gait measurement approaches do not support continuous monitoring of gait and focus on collecting limited data points in controlled lab environments. However, with advancements in wireless technology, movement patterns...
The guaranteed performance consensus for multiple agents with Lipschitz nonlinear dynamics is investigated by using the delayed consensus protocol. Based on state errors between the one agent and the other agents, the performance function is introduced to describe the consensus regulation performance. The problems are transformed into guaranteed performance stabilization problems by using a matrix...
In this paper, we propose a positioning system using a time-synchronized wireless network that can achieve high positioning accuracy without being dependent on any global positioning system (GPS) devices with cm-level accuracy as the main goal and objective. The proposed system utilizes time of arrival (ToA) method to estimate the target's position. Based on the results, we can achieve time synchronization...
In this paper, two methods to improve the secrecy of cooperative transmissions using unshared jamming are investigated in which only the source and destination nodes know the jamming signals. The jamming signals are based on unique cipher keys obtained on the high layers. In the first proposed method (SJ protocol), a source combines its secrecy signal with its jamming signal using the power allocation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.