The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
The introduction of verifiable computation came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted servers and also to the growing desire of weak clients to outsource computational tasks to more powerful computation services like in cloud computing. Verifiable computation enables a computer to offload the computation of some function, to other perhaps...
Public key encryption with keyword search applies only to the certain circumstances that keyword ciphertext can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes...
Zambia has faced economic challenges since the beginning of 2015. The economy has come under strain in 2015 due to climate change. As a result, the water levels in the main source of electricity, the Kariba Dam, have dropped. This has caused a critical power deficit. This problem has negatively affected the economy and has further resulted in reduced GDP for the country. Solar energy is a possible...
In this paper, we study a resource granularity effect on the optimal resource assignment of MME and S/P-GW in a single vEPC server. We distinguished communications of M2M devices and smartphones and modeled the vEPC server by using queueing theory. Numerical analysis under a fixed number of hardware resources of MME and S/P-GW is done for various resource granularities of the vEPC server. The evaluation...
The purpose of this article is to develop a functional model of an effective application layer firewall to protect the Web-based information systems. For successful achievement of this goal, analysis of the vulnerability of the application layer protocols and the existing means of solving these problems is performed in the paper. The technology and methods of implementation of protection means of...
Decentralized multi-authority attribute-based encryption (ABE) has been adopted to protect outsourced data. However, there are some security issues. Firstly, the user's attributes information is leaked to the authorities and secondly, the access structure being sent along with ciphertext violates its privacy. To address these issues, an efficient decentralized attribute-based encryption scheme with...
The Internet of Things (IoT) consists of all kinds of sensors which collect much information. The privacy and anonymity in IoT is fundamental to the system and must be resolved. Sima proposed a protocol about lightweight authentication and key agreement and claimed to be secure and robust against all existing methods of attack. In this paper, the author points out the vulnerability of Sima's protocol...
Information Centric Networks (ICN) is very promising for Internet of Things (IoT) deployment, where the data-centric approach is useful in reducing the data retrieval latency as well as the network traffic for IoT services. Also, the innetwork caching capabilities in ICN limits the massive data access to the data producers and so relaxes the need of continuous connectivity E2E connectivity between...
Nowadays, 5G mobile network environment has been studied and developed, and the concept of a vEPC (Virtualized Evolved Packet Core) has been introduced as a framework for Network Functions Virtualization (NFV). Machine-to-Machine (M2M) communications in 5G networks require much faster response than in 4G networks. However, if both the control plane (C-plane) and the data plane (D-plane) functions...
On functional requirements of atmospheric particle monitoring system, this paper designs a distributed atmospheric particle monitoring system. The proposed system consists of a data acquisition network, embedded gateways, a database server and remote monitoring terminals. The data acquisition network consists of mobile data acquisition nodes and router nodes distributed in monitoring areas which are...
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains (SFCs), a common cloud and...
Network Function Virtualization (NFV) is a new paradigm, enabling service innovation through virtualization of traditional network functions located flexibly in the network in form of Virtual Network Functions (VNFs). Since VNFs can only be placed onto servers located in networked data centers, which is the NFV's salient feature, the traffic directed to these data center areas has significant impact...
PerfMon is a prototype implementation of a real-time performance management method for sensor data communication in assisted living applications. It is implemented in accordance with the specification for GATT services in Bluetooth low energy (BLE). PerfMon provides a tool for real-time performance monitoring and control for caregivers and service providers. Test results from monitoring and control...
Prior load balancing solutions for chaining virtualized network functions cause significant control and data plane overheads and demand special requirements on network hardware. In this study, we present the design, implementation, and evaluation of Hash-based Traffic Steering on Softswitches (HATS), a load balancing mechanism that aims at mitigating such drawbacks. The method exploits flow hashing...
Software-Defined Networking (SDN) has turned the Data Center Network (DCN) environment into a more flexible one by decoupling control plane from data plane, allowing an innovative and easily extensible network management solutions. Nowadays, OpenFlow is the most successful protocol for SDN. However, SDN based on OpenFlow protocol presents performance issues on forwarding table increasing and packet...
The internet of things comes into our daily life. It connected lots of resource-constrained devices, denoted as smart device, in an Internet-like structure. Considering the computing burden, the CoAP protocol is developed for serving the resource-constrained device and maps to HTTP for integration with existing web. In this paper, an access-control protocol will be introduced. The protocol is designed...
Tandem queues have been used to model congestion in a wide variety of systems such as communication networks, manufacturing systems, supply chains and traffic flows. This paper considers the optimal control of tandem queues in order to mitigate surface congestion at large airports. The taxi-out process is modeled by two queues in tandem: the first one represents aircraft in a congested ramp or apron...
Security is one of the major challenges that affect the deployment of the biosensors that form Wireless Body Sensor Networks (WBSNs). However, the implementation of any security protocol will result in the introduction of additional functional blocks to the device, which invariably lead to an increase in power consumption and processing delay. Both aspects are of critical importance to biosensor nodes...
The Internet of Things comprises smart devices - objects that don't just sense and communicate, but also possess varying processing capabilities. The diversity of IoT infrastructure in terms of resources they expose poses new challenges for applications delivery. On one side, we have resource constrained devices in terms of memory, storage and processing capabilities such as mobile and sensor-gateway...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.