The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a decision model based on fuzzy logics to assign the route between source-destination nodes in elastic optical networks. The route is chosen dynamically based on the lowest cost criterion, which is calculated based on a weighted summation of three metrics, called availability of contiguous slots on the route, average availability of slots on the route and physical length of the...
Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and addressable smart things posing the capability to interact and communicate with other smart things. Every smart object consists of a microprocessor, transceiver module, sensors and power...
Threat propagation analysis is a valuable tool in improving the cyber resilience of enterprise networks. As these networks are interconnected and threats can propagate not only within but also across networks, a holistic view of the entire network can reveal threat propagation trajectories unobservable from within a single enterprise. However, companies are reluctant to share internal vulnerability...
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
Scale-free can be seemed as one of the most impacting discoveries in complex networks theory and has already been successfully proved to be highly effective in constructing error-tolerant topology structures of wireless sensor networks (WSNs). As in scale-free WSNs, a few key nodes possess most connections, requiring them to take excessive message-relay tasks. Due to this reason, the energy of these...
By carefully selecting and establishing overlay edges and computing multiple underlay-edge-disjoint paths, the ability to still fulfill demands in a VPN in case of edge-failures can be significantly increased. This article presents an approach to construct efficient and optimally resilient VPN overlay topologies together with the corresponding overlay paths to fulfill a given set of demands (connectivity...
Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism in place to allocate connections to specific...
This work describes a clean-slate inter-domain routing protocol designed to meet the needs of the future mobile Internet. In particular, we describe the edge-aware inter-domain routing (EIR) protocol which provides new abstractions of aggregated-nodes (aNodes) and virtual-links (vLinks) for expressing network topologies and edge network properties necessary to address next-generation mobility related...
Can we optimally attack networks (in terms of disrupting the ability of the nodes in the network from communicating) when the network topology is unknown? In this paper, we show that it is not always possible to do so when the network topology is unknown a priori. Specifically, we develop multi armed bandit-based techniques that enable the attacker to learn the best network attack strategies and also...
Recent approaches have proposed to empower Internet Service Providers (ISPs) with caching capabilities that can allow them to implement their own cache management strategies and as such have better control over the utilization of their resources. In this demo paper, we present CacheMAsT (Cache Management Analysis and Visualization Tool), a decision support tool to visualize the configuration and performance...
By overlay topology optimization with regard to the minimum number of overlay edges that need to breakdown until all communication between two chosen nodes ceases, the robustness against optimal attacks can be maximized and the network can still perform its operation despite (multiple) link-failures. This article presents an approach to construct optimally resilient topologies on the basis of a metric...
Telecommunication networks have been designed and deployed with over-provisioning and redundancy of resources to cope with traffic load during peak hours and quickly recover from failure. However, most of these resources are underutilized and in most of the time idle but consuming full energy. With the growing concern of energy waste and greenhouse gases (GHG), the network design principles tend to...
As most of consumer electronics are connected to the Internet, network attacks can cause massive damage and loss of data to the users. By sending periodic packet bursts to bottleneck routers, Low-Rate Denial-of-Service (LDoS) attacks can degrade the throughput of TCP applications while being hard to be detected. In this paper, we introduce Power Spectrum Density Entropy (PSD-entropy) to detect LDoS...
The routing algorithms for wireless sensor networks (WSN) are in process of optimization for addressing issues like energy conservation, delay and throughput in presence of limited resources in terms of memory, CPU processing power and power source (batteries). Although, it has not been possible to date, a development of routing algorithm addressing all the issues of WSN. Various tradeoffs exists...
Academic publication archives often draw from numerous, heterogeneous sources, whose records can follow differing naming conventions. As such, ambiguity issues concerning authorship of scientific papers often arise, such as authors sharing similar names, the use of first names versus initials, or alternate name spellings for the same author. These ambiguities have plagued research on scientific collaboration...
This is an overview paper that motivates and describes performed work done in the European Commission funded research project BASTION, which focuses on two critical problems of modern electronics: the No-Fault-Found (NFF) and CMOS ageing. New defect classes contributing to NFF have been identified, including timing related faults (TRF) at board level and intermittent resistive faults (IRF) at IC level...
Wireless mesh networks (WMNs) cannot utilize the full capability of these radio technologies without an effective channel assignment algorithm. Existing metrics for characterising the efficacy of channel assignment algorithms poorly reflect the goodput distribution in WMNs. In this paper, we develop a fitness evaluation algorithm that feeds back several indicators of efficacy to a channel assignment...
It is critical to provide sustained data throughput in edge computing, where several sensor devices generate information that needs to be fused and used for decision making in e.g., disaster incident scenes. To this end, we compare the effectiveness of two protocols, Hybrid Wireless Mesh Protocol (HWMP) and Greedy Perimeter Stateless Routing (GPSR), based upon their ability to stream data in a mesh...
Geographic Routing is suitable for the limited resource in wireless sensor networks and Ricci flow-based methods have been employed. Unfortunately, iterative process through previous methods may spend abundant energy in order to discovery route, which obviously effect their advantageous of this sort of schemes. In this paper, we focus on avoiding unnecessary iterations and propose an algorithm through...
The problem of re-identify persons across single disjoint camera-pairs has received great attention from the community. Despite this, when the re-identification process has to be carried out on a large camera network a different approach has to be considered. In particular, existing approaches have neglected the importance of the network topology (i.e., the structure of the monitored environment)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.