The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
The increasing trend of people moving to urban areas and the associated urbanization process require facing challenges regarding city infrastructures capability to cover citizens needs for energy, water, transportation, healthcare. education, safety. The smart urban technologies represent an important contribution to the sustainable development of cities, making smart cities a reality. The concept...
SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network...
In our current society, Unmanned Aerial Vehicles (UAVs), also known as drones have become common. These vehicles are controlled remotely from a Ground Control Station (GCS) or autonomously by a programmed mission. Data-link between drone and GCS can be established by using a communication protocol. The Micro Air Vehicle link (MAVLink) protocol is an open source, point-to-point networking protocol...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
The Trustful Space-Time Protocol (TSTP) allows for time synchronization to be performed upon receiving any message from another node in a sensor network, removing the need for explicit synchronization messages. Previous work has shown that TSTP performs well under controlled experimental environments. In this work, we analyze how the quality of synchronization in TSTP is affected when nodes are communicating...
Wireless Sensor Networks present several advantages when compared to wired ones, among them, the low consumption and simplicity of installation. In some cases, energy consumption may be so low as to allow the use of energy harvesting techniques, as in the case of EnOcean protocol. In other networks, it is necessary to meet specific requirements, such as in industrial ones, where communication must...
In this paper, we focus on containment control problem for discrete-time multi-agent systems (MASs). More specifically, the MASs are nonlinear systems and they are modeled by discrete-time Takagi-Sugeno (T-S) fuzzy systems. A fuzzy control protocol with a nonlinear feedback control law in each control rule is introduced, which is based on the data collected from the local agent and its neighbors....
In this paper, we revisit multi-party Diffie-Hellman key exchange (DHKE) protocols by using multi-linear mappings and Weil pairings over elliptic curves. We show how to construct a 4-linear Weil pairing and illustrate the approach by examples. Finally, we present several necessary conditions to find a distortion map for a 5-party DHKE protocol.
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
Time series prediction techniques reduce the number of messages generated at the application level, saving energy spent in the communication and, consequently, extending the network lifetime. Trickle is a well-known time series prediction mechanism commonly used to decrease the number of transmitted messages in Wireless Sensor Networks (WSN) and thus save energy. This paper presents the Space-Time...
Topology control is a crucial process for an efficient operation of a Wireless Sensor Network (WSN). The usage of WSNs in the Internet of Things (IoT) emerges new research challenges and novel applications. Recent WSNs proposals enhanced with Software Defined Networking (SDN) practices introduce new innovative network control strategies and protocols based on central control logic. This paper introduces...
Video streaming over the internet for new 3D immersive media such as Virtual Reality and 360-degree videos has drawn great attention from both consumers and researchers in recent years. One of the biggest challenges in streaming such 3D media is the high bandwidth demands. While traditional 2D video streaming is still dominating network peak traffic, new inventions are accelerating the adoption of...
The spread of antibiotic resistance is a growing problem known to be caused by antibiotic usage itself. This problem can be analyzed at different levels. Antibiotic administration policies and practices affect the societal system, which is made by human individuals and by their relations. Individuals developing resistance interact with each other and with the environment while receiving antibiotic...
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
In the age of Internet of Things (IoT), sensors form a foundational component of IoT services, yet they are rigid with little capability for programmable configuration or reusability as they are application-specific, manufacturer-specific. Emerging IoT applications often deploy a vast number of sensors which may serve multiple applications. Programmability is thus essential but not found in legacy...
This papers describes a proof-of-concept implementation of the Service Function Chaining Control Plane, exploiting the IETF Network Service Header approach. The proposed implementation combines the OpenFlow protocol to control and configure the network nodes and the NSH method to adapt the service requirements to the transport technology. The manuscript shows that the result of this combination is...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
Industrial Control Systems (ICS) networks are an increasingly attractive for attackers. The case of 2015 Ukraine cyber attack where hackers abused the ICS system to create a blackout is a good illustration of this interest. However, to achieve physical effects, it is necessary for attackers to embed themselves deep within the target network. So, attackers must protect this investment by using covert...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.