The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a real-time simulation of multi-agent systems for decentralized secondary voltage control method in distribution network. The real-time simulation is performed by using an original platform called “Distributed Energy”. It combines two tools: The first one is a real-time digital simulator for electric power simulation. The second one is a java agent development framework used to...
With the growing popularity of Voice-over-IP communication and of the SIP protocol, mobile networks including, denial-of-service attacks against the signaling are an increasingly menacing threat. We present SIPp-DD, a tool for generating real-like SIP DDoS flood attacks. SIPp-DD modifies the popular SIPp call generator and offers the option to spoof source IP addresses and ports of the generated messages...
In Eurocrypt'04, the concept of the concurrent signature was introduced by Chen, Kulda and Paterson, in which they proposed a somewhat weaker concept to solve the traditional fair exchange problem. Concurrent signatures provide a new idea for fair exchange without the help of the trusted third party. Only two parties interact to produce two signatures. However two signatures are still ambiguous from...
Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed network protocols or algorithms do not considerably depend on the underlying topology, the performance generally depends on the topology. As a result, synthetic topologies are widely utilized by network researchers to analyze performance...
Key agreement protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities and which cannot be predetermined by any party. Recently, the notion of certificateless public key cryptography was introduced to mitigate the heavy certificate management burden in traditional public key infrastructure and...
Performance benchmark of telecommunication core network relies on high throughput traffic generator. The traffic generators are software based or dedicated hardware based. The software based traffic generators are usually running on relatively cheap commercial computer in a flexible, low cost way but suffering from poor performance. The hardware based generators can provide more precisely measured...
A microgrid control system is required to efficiently monitor and optimally operate a microgrid with Distributed Energy Resources (DERs) and storage devices. This control system should provide several functions to be able to reliably and optimally manage the microgrid. A general architecture is proposed comprising of the local and supervisory controllers, communication system, enhanced Human Machine...
In our previous work, we exploited a modified version Borel Cayley Graphs (BCGs) as an underlying topology for dense wireless sensor networks using the BCG Topology Control (BCG-TC) algorithm. However, BCG-TC requires sensors to have a large transmission range to guarantee connectivity. In this paper, to overcome the transmission range limit and construct an efficient communication graph, we propose...
We consider a model of congestion for computer networks based on a continuous-time finite-state homogeneous bivariate Markov chain. The model can be used to evaluate, via computer simulation, the performance of protocols and applications in a network with random path delays and packet losses due to traffic congestion. Only one of the processes of the bivariate Markov chain is observable. In our application,...
In this paper, in a laboratory environment, the performance of four network traffic generators (Iperf, Netperf, D-ITG and IP Traffic) are compared. Two computers with Windows operating systems were connected via a 100 Mbps link and for various payload sizes, ranging from 128 Bytes to 1408 Bytes, the TCP traffic on the link was measured using the various monitoring tools mentioned above. The results...
In this paper, we present a short group signature scheme for dynamic membership with controllable link ability. The controllable link ability enables an entity who possesses a special linking key to check if two signatures are from the same signer while preserving anonymity. It can be used for various anonymity-based applications that require necessarily the link ability such as vehicular adhoc network,...
An accurate model of network topology is the fundamental to design a new network protocol. Recent efforts have been made to produce many topologies for the Internet, but few can give attention the power-law distribution characteristic in each tier of the Internet. We propose Leetar, a new Internet topology generator, which can generate topologies that contains many tiers and each tier match the power-law...
Navy shipboard power systems have limited generation capacity and include a large portion of dynamic loads and high-energy weapon loads, which can overload the generators easily. The power generation and the load demand of the system should be balanced while satisfying the system's operating constraints in real-time to make the system operate normally. This paper presents a multi-agent system for...
This paper presents a new concept of how a service provider using any kind of Service Creation Environment (SCE) can verify that a generated service meets the requirements of a customer. This requires functional tests which are derived from a finite state machine-based behaviour model being composed from so-called modular finite state machines by a new composition method. The derivation of the tests...
Switched Ethernet has become a serious candidate for real-time communication in industry and consumer electronics. Due to the unpredictable nature of switched networks, tools and techniques became necessary to determine worst case behaviour, such as network calculus, worst case scheduling analysis and network simulation. This paper proposes a network simulation technique to estimate the results expected...
Creating parameterized “chip generators” has been proposed as one way to decrease chip NRE costs. While many approaches are available for creating or generating flexible data path elements, the design of flexible controllers is more problematic. The most common approach is to create a microcoded engine as the controller, which offers flexibility through programmable table-based lookup functions. This...
In the paper we present a parser for the Session Initiation Protocol (SIP), a protocol that is a part of the 3GPP's IP Multimedia System (IMS) framework. The parser is generated by a specially designed parser generator that as an input takes an Augmented Backus Naur Form (ABNF) grammar. This type of grammar is commonly used for formal protocol syntax definitions and is used in the SIP standard. We...
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation...
We present a novel topology control algorithm for very dense wireless sensor networks that is constrained by a small maximum nodal degree k. Particularly, we limit k = 4 which makes it challenging to formulate a connected network that possesses favorable properties such as a small diameter, short average path length and low energy consumption. Towards this goal, we introduce a graph theoretic approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.