The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many Internet of Things (IoT) applications benefit greatly from low-power long-range connectivity. A promising technology to achieve the low-power and long-range requirements is seen in LoRaWAN, a media access control (MAC) protocol maintained by the LoRa Alliance and leveraging Semtech's patented LoRa radio modulation technology. LoRaWAN provides three different device classes (A, B and C), which...
The high number of cells employed in a Modular Multilevel Converter represents a challenge for the control hardware. Some authors have proposed the use of digital communications to simplify the assemblage and maintenance in such converters, but the latency they add has undesirable consequences for the closed-loop performance. In this paper, we propose a model-based compensation of the latency that...
The software-defined networking (SDN) paradigm promises greater control and understanding of enterprise network activities, particularly for management applications that need awareness of network-wide behavior. However, the current focus on switch-based SDNs raises concerns about data-plane scalability, especially when using fine-grained flows. Further, these switch-centric approaches lack visibility...
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern network security solutions. They help to detect and prevent network attacks and intrusions. However, they show critical performance problems in today's high speed networks. Filters have been proposed to reduce the amount of traffic to be analyzed by a NIDS, yet, such filters need to be very carefully designed...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
In the near future, Peer-to-Peer (P2P) energy trading is expected to contribute potentially in expanding popularity of small-scale Distributed Energy Resources (DERs). This will arguably create new markets (a new business model). Storing energy for future use is still considered to be an expensive solution. Therefore, establishing a cooperative network among the energy producers and consumers would...
Existing DR(Demand Response) protocols are designed with the most successful and popular application layer protocol, HTTP. However, due to the rapid development of the Internet-of-things (IoT) protocol, DR messaging technology based on the IoT(Internet of Things) protocol to be used for light energy devices is highly required. In this paper, we extend the existing DR protocol using CoAP which inherited...
Internet of Things (IoT) has revolutionized the traditional Internet where only human-centric services were offered. It has enabled objects to have the ability to connect and communicate through the Internet. IoT has several applications such as smart water management systems. However, they require high energy-efficient sensor nodes that are able to communicate across long distance. This motivates...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
EtherCAT is one of the real-time Ethernet protocols widely employed in industrial controls. However, its wireless extension is not straightforward due to the unique on-the-fly bus access method based on summation-frame. This paper explores the possibilities of interconnecting EtherCAT with wireless standards such as IEEE 802.11 and 802.15.4. The gateway design is presented and event-driven interconnection...
Fuzzing is a critical part of secure software development life-cycle, for finding vulnerabilities, developing exploits, and reverse engineering. This relies on appropriate approaches, tools and frameworks. File and protocol fuzzing is well covered, multiple approaches and implementations exist. Unfortunately, assessed tools do not posses the required capabilities for working with protocols, where...
HF and VHF radios retain considerable operational benefits for disaster communications. In particular, they can be the only available communications channel into a disaster zone, and are capable of communications over tens to thousands of kilometers. However, their bandwidth is extremely limited, as low as 1 bit/second, which has previously limited their utility as a backbone for public telecommunications...
The current and future trend in building and home automation sees an increasing pervasiveness of Internet of Things technologies, that allow to implement networks of low power sensors and actuators, and, at the same time, to enable advanced services and applications. In this paper we propose the use of a common protocol in the IoT domain, the MQTT, over a LoRa physical communication link, to jointly...
Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or...
In-memory key-value store is a crucial building block of large-scale web architecture. Given the growth of the data volume and the need for low-latency responses, cost-effective storage expansion and fast large-message processing are the major challenges. In this paper, we explore the design of key-value middleware that takes advantage of modern NVMe SSDs and RDMA interconnects to achieve high performance...
The family of recurrent neural network (RNN) mechanisms are largely used for the various tasks in natural language processing, speech recognition, image processing and many others due to they established as a powerful mechanism to capture dynamic temporal behaviors in arbitrary length of large-scale sequence data. This paper attempts to know the effectiveness of various RNN mechanisms on the traffic...
The primary objective of this work is to evaluate the effectiveness of various shallow and deep networks for characterizing and classifying the encrypted traffic such as secure shell (SSH). The SSH traffic statistical feature sets are estimated from various private and public traces. Private trace is NIMS (Network Information Management and Security Group) and public traces are MAWI (Measurement and...
Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over...
Secure Multi-party Computation (SMC) has been introduced to allow the computation of generic functions between two parties that want to keep secret the input they use, and share only the computed result. One of the approach proposed to solve the SMC problem relies on the design of Garbled Circuits (GC), that are Boolean circuits that can be evaluated collaboratively achieving the SMC goal. Recently,...
The Internet of Things (loT) allows transform current Internet communication in an automatically way through Machine-to-Machine (M2M) communication. The IoT probably has become one of the most popular networking concepts that has the potential to bring out many benefits. However, IoT has brought some communications challenges. In the next three years, it is expected that more than 20 billion IoT devices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.