The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent proposals enhances Wireless Sensor Networks (WSNs) with Software Defined Networking (SDN) practices, introducing new innovative network control strategies and protocols based on a central control logic, i.e., enabling WSNs as crucial facilities for the Internet of Things (IoT). In this direction, we demonstrate CORAL-SDN, an SDN solution for WSNs which: (i) uses intelligent centralized control...
SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network...
In the age of Internet of Things (IoT), sensors form a foundational component of IoT services, yet they are rigid with little capability for programmable configuration or reusability as they are application-specific, manufacturer-specific. Emerging IoT applications often deploy a vast number of sensors which may serve multiple applications. Programmability is thus essential but not found in legacy...
This papers describes a proof-of-concept implementation of the Service Function Chaining Control Plane, exploiting the IETF Network Service Header approach. The proposed implementation combines the OpenFlow protocol to control and configure the network nodes and the NSH method to adapt the service requirements to the transport technology. The manuscript shows that the result of this combination is...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
In this paper we propose oil skimmer monitoring system by user-controlled smart phone IoT(Internet of Things)-specific controller and built in BLE 4.0. The device Hardware of the IoT is the trend of OSHW(Open Source Hardware). This opens up free design content for physical artifacts together spirit with FOSS (Free and Open Source Software). As a result of the derivation of Open-source culture making...
Many-core systems are increasingly popular in embedded systems due to their high-performance and flexibility to execute different workloads. These many-core systems provide a rich processing fabric but lack the flexibility to accelerate critical operations with dedicated hardware cores. Modern Field Programmable Gate-Arrays (FPGAs) evolved to more than reconfigurable devices, providing embedded hard-core...
Many-core architectures are similar to a computer network, where it is necessary to ensure the security during the execution of sensitive applications. This article discusses two security-related issues: the secure admission of applications and the prevention of resource sharing during their execution. The safe application admission is an open research subject for many-core systems. Although several...
Data centers availability is mandatory and is conditioned by a quick response to failures and attacks thanks to efficient live forensics. However, this task is lately impossible to complete with classic systems because of encountered data rates and service diversity. Moreover, Software-Defined Networking (SDN) devices agility requirements prevent the use of Application Specific Integrated Circuits...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
Due to the ubiquitous presence of cellular networks and their exemplary success, they have been pushed forward to provide connectivity for Internet-of-things (IoT) applications with mass deployments of sensors and machines. Nevertheless, existing transmission protocols, e.g., orthogonal allocation or spectrum sharing, can be detrimental for both existing cellular users and IoT devices due to increased...
Pathfinding algorithms are at the heart of several classes of applications, such as network appliances (routing), GPS navigation and autonomous cars, which are related to recent trends in Artificial Intelligence and Internet of Things (IoT). Moreover, advances in semiconductor miniaturization technologies have enabled the design of efficient Systems-on-Chip (SoC) devices, with demanding performance...
The measurement of consumption of public services such as drinking water and electric energy, and information management is one of the problems facing intelligent cities. In this article we describe the design of a computer system that allows the management and administration of consumption records made by smart meters that communicate through MQTT using mobile telecommunications networks. The results...
E-health is one of the domains which will need more and more IoT solutions in the future, as it requires short delays for life-dependency situations and safe local storage spaces for privacy matters. The emergency context demands efficient communication and computing capacities, and the cloud vision as well as traditional TCP/IP way of communication cannot really suit these requirements. New approaches...
Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network...
Cyber-Physical Systems (CPSs) may fail during runtime on supporting decision making if they are not capable of detecting and correcting their own failures. Thus, it has been proposed that CPSs should be self-aware, context-aware and goal-aware. In this paper we present preliminary results about how an architecture built over the Extensible Messaging and Presence Protocol (XMPP) may implement a distributed...
In this paper, we propose an access control architecture for IoT systems by developing a hybrid model with attributes, capabilities and role-based access control. We apply attributes for role-membership assignment and in permission evaluation, Membership of roles grants capabilities which are used to access specific services provided by things. This approach improves policy management for IoT systems...
Wideband SATCOM provides essential beyond line-of-sight communications services. At this time, however, no widely adopted protocols exist to facilitate roaming between access domains. In addition, most commercial SATCOM networks rely on proprietary network management systems. This paper addresses use of a Manager of Manager architecture, supported by local intelligent agents, for managing a global...
It can be seen that the vision of the future networking is more focused on the things, media and services, rather than people. With the increasing importance of the Internet of Things, as well as the diversity of the objects, it is crucial to achieve the highest possible level of interoperability. This means that information exchanged needs to have the same format; in addition, data needs to be processed...
In this paper, we implement the Wi-Fi hardware architecture. The core chip designed by the MediaTek Corporation is used to develop its peripheral circuits. The chip supports USB Type and can control the lighting circuit through the APP on the mobile phone, so as to simulate the switch of household electrical appliances. In the future, consumers can purchase home appliances with built-in communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.