The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a smart load shedding scheme that monitors plant loads, plant generation and generation/utility supply reserve to select the minimum number and lowest priority loads for shedding. The paper first gives an overview of industrial power system dynamics undergoing loss of supply contingencies and existing load shed practices, such as undervoltage, underfrequency, frequency rate of...
Modern web applications face stringent requirements along many dimensions including latency, scalability, and availability. In response, several geo-distributed cloud data stores have emerged in recent years. Customizing data stores to meet application SLAs is challenging given the scale of applications, and their diverse and dynamic workloads. In this paper, we tackle these challenges in the context...
We present Nail, an interface generator that allows programmers to safely parse and generate protocols defined by a Parser-Expression based grammar. Nail uses a richer set of parser combinators that induce an internal representation, obviating the need to write semantic actions. Nail also provides solutions parsing common patterns such as length and offset fields within binary formats that are hard...
The article discusses topological properties of multihop wireless networks which are deployed as part of the advanced metering infrastructure (AMI). It proposes a network topology generator based on a real map. The generator imports topologies of buildings from a specific world area indicated by geographical coordinates. The described generator is used for analysis of statistical properties of AMI...
The number of data centers deployed by governments, enterprises, and universities has been increased affected by the development of cloud computing technologies to reduce CAPAX and OPEX. Many architectures or topologies for data center networks have been proposed to address the diverse purposes and requirements. However, the construction of data centers incurs significant costs. Moreover, there are...
Recent technological advances have given rise to the popularity and success of cloud storage. However, the prospect of outsourcing an increasing amount of data to a third party and the abstract nature of the cloud foster the proliferation of security and privacy challenges, namely, the remote data possession checking. This paper addresses this critical security concern, when storing sensitive data...
A main challenge for clinical protocol evaluations is the lack of public real-world data sets due to the private nature of patient information. We studied the case of phase 1 clinical trials where the identity of participants is key in determining their eligibility to participate in a trial. Our objective is to use the experience from our study to present a list of parameters to help generate data...
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted...
Cyclic redundancy codes are often used in communications protocols to detect and correct random bit errors that may occur due to noise in the channel. Checksums are also often used for a similar purpose, often within the same protocol stack. This paper examines the interaction between the use of CRCs and checksums in the ANSI C12.21 protocol and finds that the use of the checksum improves the net...
Time delay has adverse effects on control systems in an electric power grid. This paper analyzes the cyber-attack related time delay issues, and deals with the minimization of negative effects of such delays in smart gird system. The prediction method has been used to minimize the negative effects of time delay. The OPRT (optimal reclosing time) method to reclose circuit breakers are considered. Time...
In this paper we have compared the performance of three traffic generators (DITG, packETH, Ostinato) over a 40Gbps link. In our laboratory experiment, two computers with Linux operating systems are connected through a 40Gbps link. The payload size was varied from 64 to 8950 bytes and TCP and UDP traffic on the link was measured. To achieve the maximum throughput jumbo frames were used. The results...
The I2C (Inter-Integrated Circuit) protocol is used to attach two devices for communicating with each other in a fast way excluding data losses. With the fast development of Integrated Circuits (ICs) technology, the complication of the circuits has also raised. Therefore, the complexity of the circuit requires self-testability in hardware to palliate the product failure. Built-in-self-test (BIST)...
We introduce a platform-based design methodology that addresses the complexity and heterogeneity of cyber-physical systems by using assume-guarantee contracts to formalize the design process and enable realization of control protocols in a hierarchical and compositional manner. Given the architecture of the physical plant to be controlled, the design is carried out as a sequence of refinement steps...
Buchmann and Williams presented in 1988 a key exchange system based on the quadratic imaginary fields. In this paper, we introduce a key exchange protocol based on some imaginary biquadratic fields which is inspired by the Buchmann-Williams' method. We also give the theoretical method in order to generalize the Buchmann-Williams protocol to other fields extensions.
Taking an existing large-scale realistic discrete event simulation model [1, 2] of a mobile distributed system with more than 700 000 units we investigate the efficiency of control protocols for the software and data updates of on-board-units (OBUs). Adding four different closed-loop control protocols to the existing simulation model we explain and investigate the technical implications of the control...
Lossy identification schemes derive tightly secure signature schemes via the Fiat-Shamir transformation. There exist several instantiations of lossy identification schemes by using several cryptographic assumptions. In this paper, we propose a new construction of lossy identification scheme from the decisional RSA assumption which are introduced by Groth. Our lossy identification scheme has efficient...
The aim of this paper is to describe a general methodology for testing the mobile network core with traffic generated from a simulated access-segment. A main element of this methodology is to derive load models and mobility models from real-life traffic patterns, and use these — as well as prerecorded protocol messages — in the process. The Evolved Packet Core (EPC) of Long Term Evolution (LTE) provides...
Single-ISA heterogeneous multi-core architecture which consists of diverse superscalar cores is increasing importance in the processor architecture. Using a proper superscalar core for characteristic in a program contributes to reduce energy consumption and improve performance. However, designing a single-ISA heterogeneous multi-core processor requires a large design and verification effort which...
In Eurocrypt 2005, Kurosawa and Heng proposed a set of 3-move witness indistinguishable protocols to be incorporated in the confirmation and disavowal protocols of the FDH variant of undeniable signature schemes. Their 3-move protocols gave rise to the development of many other variants of undeniable signature schemes. In 2010, Zhou, Zhang and Li showed a weakness in Kurosawa and Heng's proof system...
By analyzing a key agreement protocol based on conjugacy and discrete logarithm problems proposed by Sakalauskas et al., we find that this protocol is vulnerable to linear attack. Then, an improved protocol on Thompson groups is proposed. The security of the new protocol is guaranteed by the uniqueness of inverse elements of a group, hiding property of hash function, discrete logarithm problem, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.