The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other...
Satellite networks are easy-to-deploy solutions to connect rural un-served and underserved areas. But satellite latency has a significant negative impact on performance. Hybrid networks, combining high-throughput long-delay links (e.g. GEO satellites) and short-delay low-throughput links (e.g. poor ADSL), can improve user experience by the use of intelligent routing. Emerging solutions, such as MultiPath...
A Content Delivery Network (CDN) is a dynamic and complex service system. It causes a huge amount of traffic on the network infrastructure of Internet Service Providers (ISPs). Oftentimes, CDN providers and ISPs struggle to find an efficient and appropriate way to cooperate for mutual benefits. This challenge is key to push the quality of service (QoS) for the end-user. We model, simulate, and optimize...
Attack graphs enable system stakeholders to understand the stepping stones or exploitation procedures that an adversary could potentially execute to impact the confidentiality, integrity, and availability of a network system. These graphs are used to assess risk and to determine components that, when hardened, contribute most to risk reduction. While these graphs are powerful and widely used in enterprise...
The implementation of security protocols within Wireless Body Sensor Network (WBSN) creates chances for more observations in the sake of performance evaluation. The robustness of such protocols can be verified by formalizing its components using different techniques. In addition, simulating the security protocol can provide an insight into several design parameters, such as response to inputs, and...
This article studies problems related to the control of inbound traffic in a given country. Its objective is to give a visibility on the inbound traffic. With this intention, we suggest an architecture allowing controlling the incoming calls effectively. The proof of the good working order of our system was made by the use of the servers linked with activation of CDR. Then, a monitoring interface...
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads...
Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN. Nevertheless, most of these solutions relax security requirements in favor of network performance. In particular, they weaken end-user privacy and the architecture's tolerance to security breaches...
Crowdsensing applications rely on volunteers to collect sensor readings using their mobile devices. Since the collected sensor readings are annotated with spatiotemporal information, the volunteers' privacy may be endangered. Existing privacy-preserving solutions often disclose the volunteers' location information to either a central third party or their peers. As a result, the volunteers need to...
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and telecommunication data centers are replaced by cloud computing environments hosting dynamic, mobile workloads. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture which enables an explicit zero trust...
The Internet of Things (IoT) enables the connections of billions of devices to the Internet. It is thus very important to effectively manage this huge amount of devices. Among many available device management protocols, Open Mobile Alliance Lightweight M2M (OMA LWM2M) has been adopted by the global M2M standards, ETSI M2M and oneM2M as the standard for device management. However, OMA LWM2M-supported...
Rapid growth of mobile traffic can be load of mobile operator's core network. Local breakout is a offloading solution of access network to save core network load and to reduce end-to-end latency. This paper proposes local breakout system in base station with Mobile Edge Computing(MEC) infrastructure. We present the service framework and interfaces for MEC server and also present architecture based...
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
Nowadays, the problem of mobile digital copyright protection becomes more and more serious, the number of mobile client and small-sized system is growing. In such a situation, this paper proposed an authentication and authorization solution which based on Kerberos for tens of thousands users. This paper introduced every links of permission describe method and authentication protocol which composed...
VoIP aims to provide safe, high efficient and low cost voice communications. It can even offer more comprehensive and quality services than the traditional telephone. Soft-Switch has the characteristics of simplicity, openness and flexibility. This paper advocates the VoIP voice communication system based on Soft-Switch. For its implementation we design and analyze the overall structure of the system...
Agricultural sector has been facing great challenges in order to feed the increasing number of population living in the world. In the future, it will be very difficult to rely on traditional farming to produce food. Some researchers and industry experts have begun developing smart farming by utilizing information technology. This paper presents the conceptual model and system design for decision support...
eScience middleware frameworks integrating multiple virtual organizations must incorporate comprehensive user identity and access management solutions. In this paper we examine usage patterns for these systems and map the patterns to widely used security standards and approaches. We focus on science gateways, a class of distributed system cyberinfrastructure. Science gateways are end user environments...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
This paper presents a research of applying software-based SDN network virtualization technology across data centers in a large enterprise. The development history of SDN was briefly reviewed at the beginning, followed by introductions to two SDN network virtualization solutions based on overlay network. An implement method in an enterprise is elaborated based on SDN solutions. This method is proved...
Cloud computing model has been among the main stream popular new technologies by providing services such as software, platform and infrastructure. In the process of providing better services for customers, cloud service providers have developed proprietary standards on how cloud application interacts with their cloud. This has been limiting the cloud adoption because of the vendor lock-in and portability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.