Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Industrial generators are increasingly often connected to networks to allow users to remotely control them. This greatly improves the usability, but it also introduces additional security risks. This work investigates the security considerations that must be taken into account when remotely accessing these generators. Three different remote access architectures are proposed and compared with each...
We propose, study and compare control strategies for preparing pure quantum states by switching dissipative dynamics. We show that with a suitable joint linear transformation the quantum (affine) dynamical generators can be transformed into linear ones, and classical results can be applied. In particular we describe and compare stabilize time-based and state-based switching rules, showing that the...
Mobile agent brings new concept on programming, especially on distributed computing paradigm. It attracts great interest because of its mobility, autonomy and persistence. But it also brings security issues i.e. insecure networks, malicious agents, malicious hosts and malicious users. One most difficult issues is protecting mobile agent from malicious host because mobile agent execute its code on...
Many IoT applications ingest and process time series data with emphasis on 5Vs (Volume, Velocity, Variety, Value and Veracity). To design and test such systems, it is desirable to have a high-performance traffic generator specifically designed for time series data, preferably using archived data to create a truly realistic workload. However, most existing traffic generator tools either are designed...
In wireless decentralized networks, nodes physically close to each other can take advantage of the shared wireless medium to generate common secrets or keys and enhance the security of communications. Previous studies already provided models, algorithms, and proofs of concept to exploit the radio physical layer and generate symmetric keys over single links. Some of these models have been adapted to...
The aim of this paper is to describe a SCADA tool for an intelligent microgrid. This application provides control over a smart microgrid that contains inverters, batteries and generators with power meters. In this system, the energy is generated by solar panels, a geothermal generator, a biomass generator and stored in batteries. The data is collected and represented on a PC Interface. The communication...
Many applications today rely on multiple services, whose results are combined to form the application's response. In such contexts, the most unreliable service and the slowest service determine the application's reliability and response time, respectively. State-machine replication and atomic broadcast are fundamental abstractions to build highly available services. In this paper, we consider the...
A time-frequency localization-based implementation of a novel technique to transmit identification and sensor information measured at the tag to the reader is presented. The proposed device presents a novel idea to modulate a sensor and ID information in a single spike. It has the ability to operate at low power as the system uses the proposed spike modulation technique with an analog backscatter...
The paper deals with the cryptographic design and experimental implementation of a scheme for (but not limited to) vehicular ad-hoc networks (VANETs). In contrast to existing solutions, our scheme does not need any complex infrastructure (like costly road-side units or special on-board devices) and is based just on users' smart-phones and Internet connection. We call this simplified concept SVANETs...
Power grid is an important element of the cyber physical systems. Attacks on such infrastructure may have catastrophic impact and hence the mitigation solutions for the attacks are necessary. It is impractical to test attacks and mitigation strategies on real networks. A testbed as a platform bridges the cyber-physical divide by bringing in the physical system inside the cyber domain, and test the...
Remote data possession checking plays a crucial role in cloud data storage. It allows the owners to verify whether their data are correctly stored in the Cloud without downloading them. To solve this problem, there are many methods proposed such as MAC-based methods, RSA- based homomorphic methods and BLS-based homomorphic methods.This paper presents and compares auditing methods which are based on...
Recently, an efficient obfuscator of indistinguishability obfuscation was constructed by Grag et al, and it is considered as a powerful cryptographic primitive. In this paper, we propose forward secure non-interactive key exchange from indistinguishability obfuscation. A non-interactive key exchange provides an efficiency of overall system, because there are no interactions between users for key exchange...
The tripartite authenticated key agreement (AKA) protocol is crucial in providing data confidentiality to subsequent communications among three parties over an insecure public network. In recent years, several identity-based and certificate less tripartite AKA protocols have been proposed. Unfortunately, most of them are insecure. In this paper, we analyze an identity-based tripartite AKA protocol...
One of the biggest advantages introduced by the Smart Grid is the ability to efficiently and simply integrate renewable energy sources that appear to be intermittent because of their dependence on phenomena that are not constant but that are an important energy supply if properly exploited. The realization of a smart grid, however, requires an infrastructure able to handle almost instantaneous bidirectional...
In this paper we investigate the problem of motion coordination of a class of multi-agent robotic systems. By means of consensus theory, we implement a decentralized control scheme which relies on the exchange of information between agents in order to obtain a coordinated motion trajectory. The key feature of this approach relies in the fact that consensus is applied to a set of exosystems (one for...
Microgrids are low voltage electric distribution grids with modular distributed energy sources and controllable loads. The DC microgrids avoid DC to AC and AC to DC conversion and minimize transmission and distribution losses. Dynamic energy management systems enhance utilization of renewable energy sources and ensure uninterrupted supply of power to critical loads. Like the traditional transmission...
We advocate the use of property-based testing in the area of sensor networks and present a framework to apply this testing methodology. Our framework provides an expressive high-level language to specify a wide range of properties, starting from properties of individual functions to network-global properties, and infrastructure to automatically test these properties in Cooja, the network simulator...
This paper studies economic power dispatch strategy in a smart grid by using the distributed consensus protocol in multi-agent systems, where there are many generation units working cooperatively under a local neighboring area to achieve a minimum solution for the optimization problem of the total cost function. At first, the analysis indicates that the total cost for generators in a smart grid can...
Distributed calculation of an economic dispatch can be used for efficient resource allocation in a power distribution system with local generation. The lossless dispatch can be implemented in a fully decentralized way, however, because the impact on real losses in a power distribution systems cannot be neglected, this kind of calculations might lead to suboptimal solutions. This work proposes a semi-decentralized...
A VoIP communication infrastructure may need to serve a substantial number of users with an acceptable voice quality. This paper investigates the suitability of the Asterisk PBX server to provide VoIP communication capabilities with an acceptable Mean Opinion Score (MOS) quality to a large number of users. The blocking probability metric is used to measure the capacity of the PBX server while MOS...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.