The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) come across various challenges when it comes to its design and operations which cause major degradation in their performance. With increasing number of applications having their own different limitations, make the challenge of application expectations even greater for such resource limited networks. These challenges appear at different layers of WSNs starting from physical...
Blackhole and greyhole attacks can cause severe problems in Delay- and Disruption-Tolerant Networks (DTNs), where connectivity is intermittent and long delays are actually the norm. Traditional security protocols cannot completely address such problems in DTNs, hence an efficient algorithm to detect malicious nodes in DTNs is imperative. In this paper, we propose a misbehavior detection system to...
In this paper, we present analytical study of routing overhead of reactive routing protocols for Wireless Multihop Networks (WMhNs). To accomplish the framework of generalized routing overhead, we choose Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO). Considering basic themes of these protocols, we enhance the generalized network models by...
The consistent performance, energy efficiency, and reliability are important factors for real-time monitoring of a patient's data, especially in a hospital environment. In this paper a routing protocol is proposed by considering the Quality of Service requirements of the body area network data packets. A mechanism for handling delay-sensitive packets is provided by this protocol. Extensive simulations...
Delay tolerant networks (DTNs), which are wireless networks prone to long delays and frequent disruptions are increasingly becoming common. We are exploring the challenges involved in designing effective event notification framework on DTNs. This paper presents the design and evaluation of a delay-tolerant event notification framework called DATEM based on the philosophy that failures and delays are...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
MANET nodes use cooperative multi-hope packet forwarding technique hence they also perform the functionality of router. The individual nodes are constrained by resources such as battery life, limited network bandwidth and CPU cycles. To save its resources a node may deny to forward packets to others for saving the resources. This could lead to degradation of network performance. To mitigate this problem,...
Wireless Sensor Network (WSN) is a large network of sensor nodes, which operates in low power and capable of transmitting to a shorter distance with low bandwidth. It comprises of sensing unit, processing unit, memory unit, power supply and transceiver. As these sensor nodes are battery operated, the lifetime of the sensor node depends on the life of the battery. The sensor nodes in the network communicate...
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every of that has computing power and may transmit and receive messages over communication links, in wireless. During this paper think about zigbee network formation and provides network protection...
This paper proposes a method on reducing processing time of the incoming packets using the signature matching in a router. According to the proposed method, the router has enhanced processing time using signature matching of necessary portion and referring of pre-investigated packet routing table. As a result, this method provides improved quality for real-time traffic such as VoIP and video streaming/conferencing.
This paper describes an implementation of multi-layer techniques using the network infrastructure provided by FEDERICA, PASITO and OneLab projects. FEDERICA project provides a network infrastructure, based on virtualization capabilities in both network and computing resources, which creates custom-made virtual environments. PASITO is a layer-2 network that connects universities and research centers...
IP-spoofing attacks remain one of the most damaging attacks in which an attacker replaces the original source IP address with a new one. Using the existing attacking tools to launch IP spoofing attacks, an attacker can now easily compromise access routers and not only the end-hosts. In this paper, we propose a trust-based approach using a Bayesian inference model that evaluates the trustworthiness...
The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious...
The use of satellites allows monitoring of mobile units with high precision in open environments like deserts. But when rescue operations or battles occur in urban context, humans and vehicles may go across or inside buildings, hence impeding satellite-based monitoring. In that case, a good solution for an accurate monitoring is to mount cameras on all mobile units involved in the operation. The images...
Real-time physiological monitoring of athletes during sporting events has tremendous potential for maximizing player performance while preventing burn-out and injury, and also enabling exciting new applications such as referee-assist services and enhanced television broadcast. Emerging advanced monitoring devices have the right combination of light weight and unobtrusive size to allow truly non-intrusive...
In this paper, we describe a path-based intrinsic monitoring protocol that can efficiently associate SNMP based MIB information to a network path within a single administrative domain. Our method is based on intrinsic monitoring, a lightweight metric collection protocol that makes use of the IPv6 Router Alert hop-by-hop option. The main advantage of our approach is that operators can rapidly associate...
A Emergency Communication System based on Wireless Mesh Network (ECS-WMN) is proposed, which is easy to deploy and report the incidents and information such as personnel positions to the field rescue center and related members of rescue groups using different approaches, such as pop-ups on a computer or PDA screen, WiFi video terminals, WiFi cell phones and so on. A ECS-WMN consists of a WMN gateway,...
In this paper we propose a Packet-based measurement technique called Floating IP Active Measurement (FIPAM) that utilizes routing loop to measure Delay and Throughput in IP networks. Calculating these parameters in multi-provider and complex networks like Internet has became a challenge as most of current active measurement tools relying on ICMP and majority of today's networks block ICMP traffics...
Wireless sensor networks are now being considered for mission critical applications, which are often largely unattended and need to operate reliably for years. However, due to the real world communication, sensing and failure realities, clock drift, and node faults, the system performance may degrade significantly over time. It is highly desirable that these natural deteriorations can be monitored...
Advances in the research of Wireless Sensor Networks (WSN) have allowed their use for several purposes, including monitoring of critical and dangerous environments. Applications in these environments share the need of operation without human intervention, which imposes autonomy and efficiency in executing their tasks, even under critical environmental conditions. Besides the traditional WSN physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.