The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
Bluetooth Low Energy (BLE) is a personal area wireless network technology that is of increasing importance for emerging Internet of Things (IoT) deployments. By design, BLE supports short-range, single-hop communication between a pair of BLE devices. As such, native BLE does not allow network-based policy control or in-network functions for service enhancement. These limitations are impediments to...
Several monitoring oriented applications in Wireless Sensor Networks (WSNs) are characterized by the necessity of two data-reporting modes: time-driven and event-driven. The former is used mainly for constantly supervising an area and the latter for event detection and target tracking. By switching between both modes a WSN can improve its energy-efficiency and accuracy of measurement processes, compared...
Medical applications, along with Information and Communication Technology (ICT), have contributed with many solutions to support the treatment of SEPSIS. However, there are few solutions for the transport of sepsis data with Quality of Service (QoS). In this paper we propose a self-manageable architecture for the provision and delivery of sepsis data using Software-Defined Networking (SDN). To evaluate...
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way....
Software-Defined Networking (SDN) emerges as a recent paradigm that grants a holistic network visibility and flexible network programmability, facilitating rapid innovation of protocol and services. Although SDN provides greater control over traffic flow than ever before, it also introduced new challenges and issues to be addressed with its management. In that light, the security and reliability of...
Wireless sensor networks (WSNs) are essential elements of the Internet of Things ecosystem, as such, they encounter numerous IoT challenging architectural, management and application issues. These include inflexible control, manual configuration and management of sensor nodes, difficulty in an orchestration of resources, and virtualizing sensor network resources for on-demand applications and services...
The recently emerging paradigm of software defined networking (SDN) predominantly employs the control-data plane OpenFlow protocol, offering centralized real-time programmability and monitoring of network devices. Effective SDN based traffic engineering using OpenFlow, particularly in campus networking however, requires sophisticated real-time user traffic visualization solution having minimum management...
Dynamic virtual machine consolidation (DVMC) using live migration is one of the most promising solutions to reduce energy consumption in cloud data centers. Distributed DVMC often aggressively consolidates virtual machines (VMs) at the high expense of Service Level Agreement (SLA) of customers due to virtual machines (VMs) workload fluctuations. To alleviate this, static and adaptive threshold algorithms...
The fast and wide advancement of the Internet of Things (IoT) boosted by the remarkable development of sensor networks, RFID, software platforms and the Internet as a global container of IoT, have opened the appetite of several vertical industries to include IoT in their strategic vision for the coming years. Academic institutions have also established projects to vigorously investigate the potential...
Modern Industrial Control Systems (ICS) integrate advanced solutions from the field of traditional IP networks, i.e., Software-Defined Networks (SDN), in order to increase the security and resilience of communication infrastructures. Despite their clear advantages, such solutions also expose ICS to common cyber threats that may have a dramatic impact on the functioning of critical infrastructures,...
Wireless sensor networks offer a pragmatic solution for monitoring in a variety of scenarios. For efficient and practical data gathering, especially in large-scale systems deployed in inaccessible areas, unmanned vehicles are becoming a compelling solution. The added infrastructure flexibility comes at the cost of limited contact time between the mobile entity and the stationary devices. The channel...
Software-defined networks (SDNs) offer network defenders the opportunity to choose from a variety of protection techniques in response to different threats. In contrast, traditional network architectures often lack the flexibility to implement threat-specific security controls. This research was conducted on a hardware SDN test bed running custom security applications to demonstrate techniques that...
Software defined network separates data and control planes that facilitate network management functions, especially enabling programmable network control functions. Event monitoring is a fault management function involved in collecting and filtering event notification messages from network devices. This study presents an approach of distributed event monitoring for software defined network. Monitoring...
This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted by today's mobile devices. The routing is enabled with intermittent service advertisements and discoveries,...
Traditional network monitoring involving packet capturing or flow sampling has many challenges such as scalability, accuracy and availability of processing resource when networks become large-scale, high-speed and heterogeneous. SDN is a promising approach to address these challenges, but each SDN switch has it's own capacity limitation, such as it's cache memory called TCAM, and thus it needs coordination...
In spite of their rapid growth, cloud applications still heavily rely on the network communication infrastructure, whose stability and latency directly affect the quality of experience. In fact, as mobile devices need to rapidly get real-time information and files from the cloud, it becomes an extremely important factor for cloud providers to deliver a better user experience. In this paper, we specify...
Software-defined deployments are growing into data center and enterprise network infrastructures. The typical promises of software-defined networks (SDN) are improved time for market, decreased risk and operational costs for services, flexibility and unified management. However, little is known and shared about how to actually manage an SDN network, especially in localising underperforming network...
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the attacker's machine. Most existing schemes for discovering MITM attack focus on detecting the mechanism used to direct the traffic through the attacker machine. This paper presents a new detection scheme that is based on matching the...
Planning and management of energy are among the most important topics nowadays due to the fact that the existing power plants and systems fail to satisfy the energy demand and keep up with the daily developing technologies. To maintain the energy need of the existing systems, researchers are aiming to improve usage and savings of available resources and systems. For example, power metering system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.