The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
This paper deals with the problem of properly simulating the Internet of Things (loT). Simulating an loT allows evaluating strategies that can be employed to deploy smart services over different kinds of territories. However, the heterogeneity of scenarios seriously complicates this task. This imposes the use of sophisticated modeling and simulation techniques. We discuss novel approaches for the...
The Internet of Things (IoT) is the current technological revolution which can upgrade the current Internet environment into a more pervasive and ubiquitous world. Due to the distributed nature and the limited hardware capabilities of IoT, a lightweight authentication scheme is necessary. A certain number of lightweight user authentication schemes suit to the IoT environment had been proposed in recent...
We design a voice-enabled Android roll call system which combines different input methods and voice operation features. Four input methods are provided to make a roll call, 1) name check method, 2) smart Mandarin phonetic method, 3) NFC scan method, and 4) voice input method. The attendances records can be automatically synchronized to the Google spreadsheet. In addition, multiple smart phones can...
Network signatures are used in network intrusion detection systems that try to detect an Internet worm by monitoring network packets. There are many ways to make polymorphic worms. One technique depends on encrypting the body, which erases both signatures and statistical characteristics of the worm byte string. Currently, intrusion detection system reads all the incoming packets and tries to find...
Crowdsourced signal monitoring systems are gaining attention for capturing the wireless spectrum at large geographical scale. Yet, most of the current systems are still limited to simple power spectrum measurements reported by each sensor. Our objective is to enhance such systems with signal decoding capabilities performed in the backend while retaining the original vision of a low-cost and crowdsourced...
In this paper we propose the Slot Reservation Announcement (SRA) access scheme to minimize the occurrence of channel-access collisions in infrastructure IEEE 802.11 networks under emergency and crowded scenarios. SRA is based on slot reservation in lieu of a randomized backoff approach to increase the channel-access success ratio. The proposed scheme rids IEEE 802.11-like access networks of throughput...
Industry 4.0 is a strategy that has been proposed to satisfy the requirements of the individual customer, while the factory will become the Smart Factory. In Smart Factory, enterprises will use device-level flexible production system to deal with the enormous variety of customer orders. However, nowadays which called Industry 3.X stage in this paper, customer requirements are still in the order customization...
Recently, mobile broadcast services such as DMB, multimedia streaming services and IPTV, caused rapid increase of multimedia services sent over the Internet. It is important to define, measure and evaluate the elements related to the quality of providing the services over the Internet. In this paper, we propose multimedia quality measurement model that evaluates the quality of multimedia from consumers...
Current revision control systems are commonly used in a distributed fashion but rely on centralized stores and low-latency communication. In this work we evaluate how they would fare in fully distributed high latency networks such as delay tolerant networks (DTNs). We show that current revision control systems impose significant costs under these conditions even in moderately-sized networks. By simplifying/improving...
This paper is a part of a research and development program conducted by Federal University of Santa Maria (UFSM) and the Distribution System State Company (CEEE-D) located in South of Brazil. The purpose of this paper is present a communication architecture for Smart Grids that uses a distributed firewall. The synchronization of rules and policies among them, it was developed a methodology that uses...
Associative data mining is the research hotspot in the field of big data, and frequent item sets mining is an important step in the analysis of associative data. This paper focuses on analyzing the frequent item sets mining algorithm based on Apriori parallel algorithm. The paper has found two shortages of Apriori parallel algorithm: one is that the key value pair are too many, another is that in...
Connecting wireless sensor networks (WSNs) to the Internet using the traditional IPV6 protocol is a significant challenge due to the short frame length of the WSN medium access layer and large IPV6 and UDP headers. Therefore, the Internet Engineering Task Force (IETF) recently formulated an encoding format (LoWPAN IPHC) to compress the IPV6 header from several bytes to several bits. A context table...
A considerable percentage of worldwide electrical energy is consumed by information and communication technology. One significant element in this perspective are the data distribution systems via Content Delivery Networks (CDNs). We introduce a new model to compute the total energy consumption of CDNs which is based on a hierarchical Internet map and that takes into account the energy consumption...
In this paper, we studied for the synchronization of CCNx that is one of the Content Centric Network (CCN) projects by using Hazelcast. CCN is considered as a way to solve the explosive growth of Internet traffic. Hazelcast is an open source In-Memory Data Grid. Hazelcast, that one of the consensus-based in-memory data grid, has the strength to speed, high-availability, and secure. To effectively...
Moving Target Defense (MTD) has been proposed as a new revolutionary technology to alter the asymmetric situation between attacks and defences. Network address shuffling is an important branch of MTD technology. However, there is no systematic introduction to network address shuffling. In this paper, we present a brief introduction to the research achievements of network address shuffling according...
This paper presents a smart NFC and Wi-Fi enabled clock. The smart clock presented in this paper is designed in a way that it connects to the Internet using Wi-Fi module, which enables it to read information to and from the cloud. The NFC chip embedded in the smart clock enables it to communicate with other NFC enabled devices, e.g., smart phone and passive tags which lets it perform tasks on the...
The portion of video traffic in the total amount of Internet traffic has been increased. As the number of users and volume of content are increased, the content providers had been suffered for processing and transferring media and they have adopt CDN technology into their service so that their burden can be alleviated. The CDN technology can be classified into three different types; ‘server farm CDN’,...
Information sharing among a group of friends or colleagues in real life is usually a distributed process: we tell each other interesting or important news without any mandatory assistance or approval from a third party. Surprisingly, this is not what happens when sharing files among a group of friends over the Internet. While the goal of file sharing is to disseminate files among multiple parties,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.