The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional...
The increasing trend of people moving to urban areas and the associated urbanization process require facing challenges regarding city infrastructures capability to cover citizens needs for energy, water, transportation, healthcare. education, safety. The smart urban technologies represent an important contribution to the sustainable development of cities, making smart cities a reality. The concept...
The Trustful Space-Time Protocol (TSTP) allows for time synchronization to be performed upon receiving any message from another node in a sensor network, removing the need for explicit synchronization messages. Previous work has shown that TSTP performs well under controlled experimental environments. In this work, we analyze how the quality of synchronization in TSTP is affected when nodes are communicating...
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication...
In this work, a method to design STIM for sensor network system is proposed. Hardware selects TMS320F28335 as main controller. A common software implementation method is also presented. Electronic spreadsheet and independent interface configuration is the key research points to realize hot-plug function. After testing, system can be used in electric transmission line leakage current and voltage detection...
Internet scale continues to expand, the IPv6 protocol standard is implemented in the network gradually, make the behavior characteristic of the network become more changeful and more unstable, so it can be more detailed to carry on network situation perception system according to network data stream to become the next research direction. The support of IPv6 Network Situation Awareness system is realized...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
Non-malleable commitments, introduced by Dolev, Dwork and Naor (STOC 1991), are a fundamental cryptographic primitive, and their round complexity has been a subject of great interest. And yet, the goal of achieving non-malleable commitments with only one or two rounds} has been elusive. Pass (TCC 2013) captured this difficulty by proving important impossibility results regarding two-round non-malleable...
Non-malleable commitments are a fundamental cryptographic tool for preventing against (concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in 1991, the round-complexity of non-malleable commitments has been extensively studied, leading up to constant-round concurrent non-malleable commitments based only on one-way functions, and even 3-round concurrent non-malleable...
Cyber-Physical Systems (CPSs) may fail during runtime on supporting decision making if they are not capable of detecting and correcting their own failures. Thus, it has been proposed that CPSs should be self-aware, context-aware and goal-aware. In this paper we present preliminary results about how an architecture built over the Extensible Messaging and Presence Protocol (XMPP) may implement a distributed...
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
The clock synchronization technologies applied to controlling layer and primary equipment like intelligent switchgear of processing layer in intelligent substation are analyzed in this paper. IEEE1588 message timing mode, which can be accurate to nanosecond, is used as the mode of substation system, in order to fulfill the real-time and accuracy requirements of intelligent switchgears and remote control...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
Future tactical communications involves high data rate best effort traffic working alongside real-time traffic for time-critical applications with hard deadlines. Unavailable bandwidth and/or untimely responses may lead to undesired or even catastrophic outcomes. Ethernet-based communication systems are one of the major tactical network standards due to the higher bandwidth, better utilization, and...
Over the years the number of elements in a corporate network, the services and the amount of traffic have grown significantly. For this reason, it is increasingly important to analyze the traffic. Packet-based analysis is the traditional option but entails a high resources consumption. In order to palliate this, flow-based analysis arises. It usually implies to deploy a flow exporter, responsible...
Internet of Things is a growing market. Given the keen interest wide public is showing, manufacturers keep launching new models and types each day, trying to connect the real world to Internet. However, while trying to connect everything in our life, manufacturers are facing new challenges that may impact this market growth. In this work, we tackle these challenges and how we can face them by proposing...
This paper presents the development of an Indigenous On-Board Diagnostic Kit and a remote on-line diagnostic system for Euro standard vehicles using On-Board Diagnostics (OBD) and GSM technology. The different parts of the system are indigenous developed OBD Kit, Communication Module and GUI for main server. The vehicles are equipped with OBD kits and communication modules with GSM, The Electronic...
IEC 61850 is an international standard for digital substation automation systems based on network communication platform. It has been widely used in power generation, transmission, distribution and scheduling. The protocol implemented unified modeling for object, enhanced interoperability and interchangeability between different terminals. In this paper, we apply the protocol is to power and environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.