Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Linear structural equation models (SEMs) have been very successful in identifying the topology of complex graphs, such as those representing tactical, social and brain networks. The rising popularity of multilayer networks, presents the need for tools that are tailored to leverage the layered structure of the underlying network. To this end, a multilayer SEM is put forth, to infer causal relations...
With the flexibility and programmability levels offered by Network Functions Virtualization (NFV), it is expected to catalyze the upcoming “softwarization” of the network through software implementation of networking functionalities on virtual machines (VMs). While looking into the different issues thrown at NFV, numerous works have demonstrated how performance, power consumption and, consequently,...
Network functions like load balancers and stateful firewalls which traditionally have been packaged in a single proprietary device are now being virtuahzed in software across multiple physical devices networked together to achieve greater flexibility and scale. A virtualization can become very complex. Separating its definition from the software that implements it allows this complexity to be managed...
A Cooperative Intelligent Transportation System is a transportation system where involved stations can sense their environments and communicate with each other in order to take certain decisions. Many applications are being proposed such as cooperative crash avoidance. However, the information exchanged between the stations may lead an adversary to determine the identity and also the behavior of the...
Named Data Networking (NDN) is a promising future network architecture. In NDN, caching is widely deployed to improve content delivery. A lot of caching strategies have been proposed to improve caching performance, such as complicated cooperative caching and non-cooperative caching. No-cooperative Probability caching is proposed to increase the content variety across caching nodes, although it enjoys...
Low-Power Wide Area Networks (LP-WANs) are emerging as a promising solution for connecting Internet of Things and Machine Type Communication devices. If ultra-narrowband (UNB) networks, a subclass of LP-WANs, reach predicted deployment numbers and densities, they will face two challenges: inter-technology and intra-technology interference. This paper proposes the first experimental architecture designed...
With the advance of the Internet of Things (IoT), the interaction between humans and smart objects is already a reality. New applications that are expected to operate in dynamic environments must support different modes of human/machine interaction (e.g., voice and sign language), exhibit same or better performance in heterogeneous wireless and optical networks, and be able to react in real time....
Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval,...
Campuses and cities of the near future will be equipped with vast numbers of IoT devices. Operators of such environments may not even be fully aware of their IoT assets, let alone whether each IoT device is functioning properly safe from cyber-attacks. This paper proposes the use of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We first collect and...
Decentralized multi-authority attribute-based encryption (ABE) has been adopted to protect outsourced data. However, there are some security issues. Firstly, the user's attributes information is leaked to the authorities and secondly, the access structure being sent along with ciphertext violates its privacy. To address these issues, an efficient decentralized attribute-based encryption scheme with...
Computer networking testbeds have made it easier for researchers to conduct realistic evaluations of new network protocols or services. However, it is challenging for users to configure testbeds or other experimental networks so that they are representative of typical home broadband links. To address this issue, we have developed a tool with which experimenters can configure links whose characteristics...
We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the absence of the more precise GPS information. We focus on the “leisure time” behavior,...
The increasing demand for smarter yet more efficient indoor spaces necessitates moving towards advanced technologies, such as Internet of Things architectures, to allow further integration to our physical world. In this work, we introduce a Bluetooth Low Energy-based infrastructure for location-aware buildings, along with a full-scale real-subject trial. The trial was undertaken with students in our...
MmWave communications, one of the cornerstones of future 5G mobile networks, are characterized at the same time by a potential multi-gigabit capacity and by a very dynamic channel, sensitive to blockage, wide fluctuations in the received signal quality, and possibly also sudden link disruption. While the performance of physical and MAC layer schemes that address these issues has been thoroughly investigated...
Software Defined Satellite Network (SDSN) is a novel framework which brings Software Defined Network (SDN) technologies in the satellite networks. It has great potential to achieve effective and flexible management in the satellite networks. However, the frequent handovers will lead to an increase in the flow table size in SDSN. Due to the limited flow table space, a lot of flows will be dropped if...
Automated fare collection (AFC) systems have been widely applied to practical transportation due to their convenience. Although there are many potential threats of NFC such as eavesdropping, data modification, and relay attacks, NFC based AFC systems are considered secure, due to the limited 10cm communication distance. Nevertheless, the proliferation of NFC-equipped mobile phones make such system...
Understanding the mobile user flow flux patterns is important for numerous applications relevant to crowd movement, from information sharing, networking, to security and public health. Particularly in instances of smart buildings and hospitals, among others, the flow between indoor locations, and mobility modeling within buildings is of a prime significance. Much of the mobility modeling studies have...
With the advances of control and vehicular communication technologies, a group of connected and autonomous (CA) vehicles can drive cooperatively to form a so-called cooperative driving pattern, which has been verified to significantly improve road safety, traffic efficiency and the environmental sustainability. A more general scenario that various types of cooperative driving, such as vehicle platooning...
The Magnetic Induction (MI)-based communication techniques enable the applications of wireless sensor networks (WSNs) in complex environments, such as underground and underwater environments. However, the complex environments usually consist of many conductive objects that can significantly enhance or block the MI signals. Efficient communications can be achieved if we can smartly utilize the positive...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.