The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile computing proved to be essential in today's cyber communications. However, entities in mobile computing are known of having limited energy, physical, and logical resources. This imposes various challenges that greatly affect communication quality and performance of those mobile entities, especially when applying computationally-intensive security measures that are essential for protecting the...
In this paper, we study secure transmission designs for underlay cognitive radio networks in the present of randomly distributed eavesdroppers. We consider the scenario where a secondary transmitter sends confidential messages to a secondary receiver subject to an interference constraint set by the primary user. We design two transmission protocols under different channel knowledge assumptions at...
Vehicular ad hoc networks (VANETs) have been attracting interest for their potential roles in intelligent transport systems (ITS). In order to enable distributed ITS, there is a need to maintain some information in the vehicular networks without the support of any infrastructure such as road side units. In this paper, we propose a protocol which can store the data in VANETs by transferring data to...
We present a distributed tax preparation application as an example of anonymous processing in the cloud where processing units are interconnected anonymously via intermediaries. This example uses the double-locked box which was used in the anonymous credit card in the 1990s. However, unlike the anonymous credit card our application automates the distribution of the double-locked boxes and the connection...
Traffic control at road intersections is based on traffic lights (TLs). The control mechanism typically used for traffic lights operates based on a periodic schedule to change the light (red/yellow/green). In many cases, a different schedule is used in late night/early morning hours. This fixed control mechanism does not adequately account for changing traffic conditions, and is unaware of/unresponsive...
The future airspace system is being defined by several initiatives. SESAR in Europe and NextGen in the USA are working towards the modernization of ATM procedures. The foreseen integration of remotely-piloted aircraft in unsegregated airspace is also shaping the future ATM.
Novel measurement technologies for specific absorption rate (SAR) assessment of wireless devices have been developed using sensor arrays to dramatically reduce the measurement time compared to single-probe scanning systems. While single-probe scanning systems are optimized for low measurement uncertainty and source-independent accuracy, array systems are in widespread use for design testing and have...
The specific capabilities of Wireless Sensor Networks (WSNs), such as fast deployment and flexibility, together with the low cost solutions that can be achieved, bring new opportunities for an all-new range of applications, far from the typical scenarios of low requirements and high redundancy. Some of these new scenarios involve the assurance of predefined performance goals. To guarantee that these...
The Internet of Things (IoT) is a new paradigm that envisions ubiquitous connectivity. It provides new ways in which distributed systems can be imagined with devices communicating with each other and also with humans. The data provided by such a large, heterogeneous network can be leveraged to provide enhanced services to society and solve problems previously deemed impossible. Most devices in IoT...
Nowadays, the explosion of cloud-based applications is leading to a much higher demand on both computing and network infrastructure resources than only a few years ago. Enhancing the user experience, by reducing the latency and increasing network stability, becomes an important challenge for cloud operators. In this paper, we propose a unified protocol architecture, based on the Locator/Identifier...
This demonstration presents a user-friendly web-based platform that supports intuitive remote benchmarking of different indoor localization solutions. It reduces the barriers for experimental evaluation and fair comparison of their performance across a set of testing environments. The platform is aimed at addressing the limitations in the current praxis of publishing indoor localization research evaluated...
We study the problem of multi-party computation under approximate (ε,δ) differential privacy. We assume an interactive setting with k parties, each possessing a private bit. Each party wants to compute a function defined on all the parties' bits. Differential privacy ensures that there remains uncertainty in any party's bit even when given the transcript of interactions and all the other parties'...
We have collected a new face data set that will facilitate research in the problem of frontal to profile face verification ‘in the wild’. The aim of this data set is to isolate the factor of pose variation in terms of extreme poses like profile, where many features are occluded, along with other ‘in the wild’ variations. We call this data set the Celebrities in Frontal-Profile (CFP) data set. We find...
The general method available for comparison between the Distributed Hash Table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lookup service with lookup retries for failed lookups, both average latency per successful lookup as well as percentage of successful lookups are key to evaluate the performance. Although,...
This report analyses security threat of a covert channels to popular P2P networks and their support protocols, like Kademlia, Mainline DHT. This kind of a threat was almost unattended by majority of researchers, despite its considerable potential dangerousness. Using a new, comprehensive approach to the analysis of the covert channels, based on previously proposed generalized model of covert channel,...
A wireless sensor network collects information by sensing and gathering through sensor nodes in a continuous or discrete manner which makes them application specific. Stability period and network lifetime are key issues to judge and analyse the working of the sensor nodes and the efficiency of the sensor network system for a long time. Designing energy efficient multitasking clustering protocols for...
Cloud storage has gained increasing popularity in the past few years. In cloud storage, data is stored in the service provider's data centers, and users access data via the network. For such a new storage model, our prior wisdom about conventional storage may not remain valid nor applicable to the emerging cloud storage. In this paper, we present a comprehensive study and attempt to gain insight into...
Wireless communications are subjected to radio jamming attacks due to the fact that the transmission medium is open to any hostile attackers. In a radio jamming, an attacker can jam a channel by emitting a radio signal in certain strength without understanding the protocol. It may also try to disrupt the RF operations of a communication protocol if it understands the protocol. Detection of the jamming...
Multihop networking is promoted in this paper for energy-efficient and highly-scalable Internet of Things (IoT). Recognizing concerns related to the scalability of classical multihop routing and medium access techniques, the use of blind cooperation in conjunction with multihop communications is advocated herewith. Blind cooperation however is actually shown to be inefficient unless power control...
The proper modeling of road traffic is paramount to the dependability of studies on vehicular networking solutions intended for highway environments. Yet, it is not clear which is the actual level of detail in the mobility representation that is sufficient and necessary to such studies. This uncertainty results into a variety of approaches being adopted in the literature, and ultimately undermines...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.