The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A computer has become possible to operate more services by improving the performance. Therefore, there is a growing tendency to aggregate a single computer. In consequence, a virtualization technology such as VM (Virtual Machine) is receiving a lot of attention.
The study for the establishment of a complete flight information system that Provide airport management authorities as passengers aboard the aircraft before departure and after the arrival of the various kinds of information, In order to after the arrival of the aircraft to help passengers get instant information, Flight management system has been capture by the Aeronautical Information Services system...
With the implementation of the national internet plus strategy, more and more devices enjoy the chances of getting access to internet. But for devices like sensors whose resources are quite limited, it is a tremendous challenge to link to the Internet by using the traditional communication methods. Taking the memory size, computing power and energy consumption of the resource-constrained device into...
In this paper, we discuss the implementation of LoRa network server on OpenStack. LoRa is a type of low power wide area wireless network protocols for Internet of Thing applications. We restructured the operations of LoRa network server so it can be flexible and scalable by exploiting the system services provided by OpenStack. For validation, we have established an experimental system by using available...
Smartphones, with vast connectivity and sensing capabilities, are the natural choice to serve as gateways for physiologic sensors and body area networks. Machine-to-Machine (M2M) middleware standards are driving the emergence of Internet of Things (IoT) applications by providing autonomic interoperability. However, standards remain opaque and difficult to interpret, throttling implementation. In this...
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough...
Information leakages are one of the main security threats in today's Internet. As ICN is expected to become the core architecture for Future Internet, it is therefore mandatory to prevent this threat. This paper proves that some ICN configuration prevents information leakages via Data packets and shows that it is an open problem to prevent interest packets from carrying encoded crucial information...
In recent years, there has been an important growth in online gaming. Nowadays, Massively Multiplayer Online Games (MMOGs) may involve millions of synchronous players scattered around the world and engaging with each other within a single shared game. In this paper, we propose a new technique to communicate between players and game server, and between them based on hybrid Peer-to-Peer architecture...
With more and more attention to solar energy, the monitoring of solar cells and energy storage systems is gradually important. This research uses the Raspberry Pi as the core processor to develop the mobile monitoring system. Our system can be divided as three parts, the first part is to sense the information including photovoltaic panel image and battery indexes such as voltage, current, SOC (state...
"Let's Share" is an android application developed for the college use which integrates a file sharing system to share several attachments like files(pdf, text, etc) and multimedia files(images, audio and video) in one touch. It also helps the faculty members to inform students about the events that the college is going to organize by sending regular notifications and broadcast campus news...
Attribute-Based Encryption (ABE) is a public key encryption scheme that allows users to encrypt and decrypt messages based on user attributes. In this paper, we consider the problem of constructing a ciphertext-policy attribute-based encryption (CP-ABE) scheme in a setting where the attributes distributor is also the owner of messages that are to be encrypted and shared. The CP-ABE scheme we propose...
Virtualized access to M2M (Machine-to-Machine) devices can offer to operators various benefits in terms of hardware and management costs. However, it is often impeded by the inability to efficiently handle the traffic from the devices towards servers that are appropriate to serve as virtual hosts for the given devices. In this paper we present a solution which can be applied in a virtual Home Gateway...
IoT resource registration and lookup interfaces have been specified for Resource Directory (RD) with defined resource link format in IETF standard. However, it has many drawbacks due to the nature of the centralized architecture. This paper proposes an ICN-based distributed RD architecture. The proposed distributed IoT resource discovery and routing mechanisms allow and reuse the existing RD resource...
To provide cellular communications for a large number of internet of things (IoT) devices, the mobile core system, called as evolved packet core (EPC) in the 4G system case, emerges to equip a large amount of computational resources. This is because the EPC needs to maintain state information on the communications of the IoT devices, even if they rarely send data. This paper proposes a method for...
In the urban city life, a human usually uses his/her owned user equipment (UE) to request services provided in smart cities. In order for UEs to communicate with the public service providers, the network traffic is generated in the cellular network (e.g. Long Term Evolution (LTE) network) and the Internet very frequently. And the returned results cannot be shared among UEs although they may request...
Disaster Prevention and Mitigation (DPM) is aimed to help people to prevent and reduce property damage in time. In this paper, we propose a DPM system called Gaia, which collects sensed data, and sends them to a back-end DPM Server with improved performance. Gaia is equipped with double 3G interfaces and Load Balancing mechanisms with Round Robin scheduling to ensure stable transmission. Furthermore...
Network traces are one of the most exhaustive data sources for the forensic investigation of computer security incidents. Recent advances in capturing the network traces techniques have facilitated the forensic processing, including the reconstruction. Unfortunately, off-line web-downloading chain reconstruction could not meet the demands for real time processing. Furthermore, the packets in prior...
Students in Indonesia have been cutting classes for some time now and it has become a bad habit. They leave their house towards their educational institutions, either school or college, but in fact, they go somewhere else. The issue was supported by the lack of communication between the school and parents related to student attendance. Dealing with the problems mentioned above, it is needed to create...
One of the challenges faced by today's Internet of Things (IoT) is to efficiently support machine-to-machine communication, given that the remote sensors and the gateway devices are connected through low bandwidth, unreliable, or intermittent wireless communication links. In this paper, we quantitatively compare the performance of IoT protocols, namely MQTT (Message Queuing Telemetry Transport), CoAP...
In order to make wireless technology be easily applied in industrial environment, the wireless gateway for industrial fieldbus has been designed. This paper studies network structures and protocols of PROFIBUS-DP and Wi-Fi at first, then puts forward to using the method of embedded gateway finishing the interconnection communication of the two kinds of heterogeneous networks. Finally, the paper designs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.