The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Japanese government aims to introduce completely autonomous vehicles by 2030. Autonomous vehicles are expected to reduce the number of accidents and traffic jams. However, incomplete exchange of yielding intention between human-driven vehicles and computer-controlled autonomous vehicles, which will run on same roads, may lead to accidents or traffic jams. This paper proposes a system that enables...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
A key success factor for a smart grid lies on reliable data exchange between components across domains in the grid. However, a smart grid involves various types of devices and equipment having different quality concerns and computing capability, which requires a flexible communication platform that can accommodate heterogeneous devices. The Data Distribution Service (DDS) is a standard for data-centric...
Virtual Desktop Infrastructure refers to a process of running user's desktop in a virtual machine that lives on a server in the datacenter. A protocol is important in the communication process of virtual desktop infrastructure. For small deployment scenario, we have two options: using built-in RDP protocol that comes from Windows desktop; or adding more investment for PCoIP protocol in VMware environment...
A remote memory paging system called a distributed large memory (DLM) has been developed, which uses remote-node memories in a cluster, as the main memory extension of a local node. The DLM is available for out-of-core processing, i.e., processing of large-size data that exceeds the main memory capacity in the local node. By using the DLM and memory servers, it is possible to run multi-thread programs...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
This work studies the problem of MPC decentralization - that is, identifying a set of computing nodes to securely and efficiently execute the multi-party computation protocol (MPC) over a sensitive dataset. To balance between underdecentralization with high risk and over-decentralization with high cost, our unique approach is to add social-awareness, that is, the MPC protocol, running over a social...
The purpose of this article is to develop a functional model of an effective application layer firewall to protect the Web-based information systems. For successful achievement of this goal, analysis of the vulnerability of the application layer protocols and the existing means of solving these problems is performed in the paper. The technology and methods of implementation of protection means of...
The internet of things comes into our daily life. It connected lots of resource-constrained devices, denoted as smart device, in an Internet-like structure. Considering the computing burden, the CoAP protocol is developed for serving the resource-constrained device and maps to HTTP for integration with existing web. In this paper, an access-control protocol will be introduced. The protocol is designed...
Radio Frequency IDentification(RFID) is one of the most important sensing techniques for Internet of Things(IoT) and RFID systems have been applied to various different fields. But an RFID system usually uses open wireless radio wave to communicate and this will lead to a serious threat to its privacy and security. The current popular RFID tags are some low-cost passive tags. Their computation and...
Named-Data Networking (NDN) is a novel clean-slate architecture for Future Internet. It has been designed to take into account a new use of the Internet and especially accessing content for a large number of users, and it integrates several features such as in-network caching, security or multipath. As NDN relies on content names instead of host address, it cannot rely on traditional Internet routing,...
The technological rebellion has made current generations to depend more on the digital world in their day to day life. The effectiveness of the digital world has changed the learner's perceptive towards the education system. The impulsivegrowth of technology has increased the popularity of Information and Communication Technology which has created a research scope in Computer network domain thus Computer...
Development of algorithms for discovering the location of nodes in a wireless sensor network is a task that offers a lot challenges to the research community. In this paper, we present a protocol for locating nodes in a wireless sensor network. The proposed protocol follows a locate-promote and split strategy. We analyze the number of iterations needed to locate almost all nodes in a network and the...
Smart meters allow data acquisition from the customers to be conducted frequently and enable customer participation through various demand side response mechanisms. With support of information and communications technology, smart meters can be controlled and monitored remotely over the wireless broadband public network. Therefore, smart meters are vulnerable to cyber attacks due to connectivity and...
In recent years inductive power transfer (IPT) has become more and more important. From contactless charging of mobile phones or electric vehicles it will be increasingly seen in consumer electronics. In IPT systems power is contactlessly transferred over an air-gap by strongly coupled coils.
In this paper, we aim to minimize in-body sensor node energy consumption and to prolong the network lifetime by utilizing a relay strategy based on our proposed flexible quality of service (QoS) radio frequency communication module and advanced In-to-out body path loss (PL) model. A selection algorithm is derived and investigated in which the relay nodes with lower energy consumption and minimum distance...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Achieving the quality of service (QoS) is an important requirement in a communication network. Satellite communication is posing many challenges due to the limitation of transmission control protocol (TCP) over networks with high latency. To overcome these issues, the wide area network (WAN) optimization provides the data transfer on such long-distance networks. However, this optimization is not able...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.