The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater acoustic grid network is promising for providing high data rate and wide coverage service. For the scheduled time division multiple access (TDMA) protocols in the underwater acoustic grid networks, scheduling is an essential part to achieve reliable and energy efficient performance. Scheduling not only completely guarantees the interference free transmission in the network, but also makes...
Underwater acoustic sensor networks are characterized by limited transmit power and bandwidth, and a harsh communication environment. Different techniques for reliable communication in underwater networks have been studied in the literature at different layers of the network protocol stack. Among these, the use of fountain codes as a way for improving the quality of the communication over a highly...
This paper presents a secure protocol for authenticating Electronic Control Units (ECUs) in the Controller Area Network (CAN) bus and establishing session keys between them. These keys are used to introduce message source authentication for the CAN network. Our method is based on the elliptic curve cryptography (ECC) which is more suitable for embedded systems where computational power and memory...
Bringing to the market intelligent vehicles is one of the current challenges faced by car manufacturers. These vehicles must be able to communicate in order to cooperate and be more effective. The issue of inter-vehicle communications is an active research topic. This paper proposes a reliable geographical broadcasting protocol which has a twofold goal: limiting the risk of interference and reducing...
Bonus point systems are widely used for rewarding customer loyalty in both traditional and electronic commerce scenarios. Merchants aim to additionally increase revenue by targeted advertising using customer data. At the same time, customers wish to protect their privacy of what they purchase. Common systems neither provide sufficient protection of privacy, nor protect the customers' identities. Anonymity...
Electric vehicles are becoming parts of our daily lives with the increasing investment from auto industry. However, their charging is an issue as this requires frequent charging and longer waiting times compared to traditional gasoline-based vehicles. The charging is typically done at residential or public charging stations. With the increased dominance of electric vehicles, one potential solution...
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W_1, W_2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifically,...
Non-malleable commitments, introduced by Dolev, Dwork and Naor (STOC 1991), are a fundamental cryptographic primitive, and their round complexity has been a subject of great interest. And yet, the goal of achieving non-malleable commitments with only one or two rounds} has been elusive. Pass (TCC 2013) captured this difficulty by proving important impossibility results regarding two-round non-malleable...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
In order to ensure that the message is fresh, both the identity of the communication and the shared key in the session are reliable, while avoiding the defects of the old message retransmission attack and identity posing in the native NS protocol, the optimized protocol adopts the means by which the receiver communicates with the key distribution center, and add the sender's identity and the temporary...
To satisfy the requirements of complex distributed power electronic system (PES) communication, this paper has proposed a single optic-fiber link data communication protocol based on the Manchester code due to an vacancy in the commonly-adopted protocols, analyzed the encoding and decoding principle of Manchester code, defined the formats of command frame and data frame, calculated the communication...
Most of IoT applications include large number of distributed sensors which are interesting in specific geographical area. A large number of IoT entities have multiple relations and dynamic connections with each other. And there are many group communication requirements. Flexible multicast mechanism will be essential in such environments but it is difficult to satisfy verious requirements by means...
With the increase in population and automobiles, the traffic jam in urban areas is becoming a critical issue. These traffic jams especially at the intersections not only increase the delay for drivers, but also increase fuel consumption and the air pollution. The fixed-time traffic light controller is one of critical factors that affect the traffic flow at intersections. This paper proposes a new...
We propose an underlay decode-and-forward cognitive (UDFC) scheme under joint effects of hardware impairments at secondary users and interference constraints at multi primary receivers. In this scheme, the transmit powers of a source node and relays are constrained by interference thresholds of primary receivers in which the best relay is selected has the highest decoding capacity from the source...
In this paper, we propose a feedback-aided irregular repetition slotted ALOHA (F-IRSA) protocol which depends on the distance between the received packet and the set of packets already recovered at the receiver. We employ feedback messages to terminate the user retransmission process, and use successive interference cancellation (SIC) for packet recovery. We evaluate the number of transmissions per...
This work is motivated by the need for the fundamental increase of spectral efficiency with the transmissions on the Transmission Control Protocol and the Internet Protocol (TCP/IP). To emphasize the work in physical layer, we define a bit-unit (BU) that is conceptually similar to an IP packet containing sufficient information for its destination node to identify the address and interpret the contents...
Efficient content distribution is a critical challenge in vehicular networks (VANETs). This is due to the characteristics of vehicular networks, such as high mobility, dynamic topologies, short-lived links and intermittent connectivity between vehicles. Recently, information-centric networking (ICN) has been proposed to VANET scenarios for improving content delivery of infotainmentapplications. However,...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
This work is motivated by the need for the fundamental increase of spectral efficiency with the transmissions on the Transmission Control Protocol and the Internet Protocol (TCP/IP). We define a bit-unit (BU) that is conceptually similar to an IP packet that contains sufficient information for its destination to identify the address and interpret the contents. Armed with these functions, each BU is...
Failing to make use of multi-path advantages in data center networks (DCNs) has confined accessible resources and increased the possibility of congestion. In this paper, we have presented a new algorithm for traffic engineering (TE) in a modular mode. In the proposed algorithm, the less loaded paths for conduction of current are selected with regard to the present conditions as soon as a current is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.