The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective messaging protocol is a challenging and daunting task for any organisation because it depends on the nature of the IoT system and its messaging requirements. Copious messaging protocols have been developed...
In this paper a physical layer transmission method based on the channel prediction and users quality-of-service(QoS) is proposed. The time-varying Rayleigh fading channel is predicted by back propagation neural network (BPNN), which will serve as judging whether the system secure transmission capacity is redundant. Then a scheme to choose the best physical layer security coding under the secure transmission...
Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning play an important role in our society, give rise to systems that can manage themselves. WSNs have been used in various industrial applications, where reliability...
Internet of Things (IoT) is characterized by heterogeneous devices that interact with each other on a collaborative basis to fulfill a common goal. In this scenario, some of the deployed devices are expected to be constrained in terms of memory usage, power consumption and processing resources. To address the specific properties and constraints of such networks, a complete stack of standardized protocols...
There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constraints. Most of them deal with network slicing aspects as a central point, often strengthening slices with slice isolation. The goal of this paper is to present and examine the isolation capabilities...
Multi-tenancy in cloud-based applications helps cloud providers improve their Quality of Service (QoS) and reduce service customization and maintenance time. This result is achieved by sharing resources among many tenants, which can be in the form of applications composed of multiple web services. However, distinct tenants may impose different security requirements on their perspective of the application...
The enhanced method of calculating the probability of message compromising in a communication network when using overlapping routes with series-parallel and combined structure are considered. A number of numerical examples have been used to analyze the influence on message compromising of security parameters belonging to certain elements (links) and fragments of the network. It is shown that the proposed...
The current CPE deployment model, which is based on deploying “intelligent” independent equipment in the customer premises, has important challenges that have been limiting the profitability of services for telecommunications service providers. Cloud CPE model provides a win for cost and service performance for the future, as it reduces onsite CPE complex requirements to a minimum and moves these...
Ethernet based secure VPLS (Virtual Private LAN Services) networks require to establish full mesh of VPLS tunnels between the customer sites. However, the tunnel establishment between geographically distant customer sites introduces a significantly high delay to the user traffic transportation.In this article, we propose a novel fast transmission mechanism for secure VPLS architectures to reduce the...
A new era of automated services has permeated user's daily lives thanks to paradigms such as Smart City and the Internet of Things. This shift from traditional applications is possible due to the massive amount of heterogeneous devices that constitute the Internet of Things. To provide newly improved characteristics to these services, such as mobility support, high resilience, and low latency, an...
Hybrid Clouds couple the scalability of public Clouds with the greater control supplied by private ones. Hybrid Cloud Brokers support customers in selecting the most suitable providers' offers, optionally adding the provisioning of dedicated services with higher Quality of Service (QoS) levels. A clear evaluation of the benefits on performance and energy savings brought about by any allocation strategy...
Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is...
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal...
This paper presents an advanced Security QoS provisioning module with vertical multi-homing and multi-streaming framework for 5G mobile terminals with radio network aggregation capability in next generation mobile and wireless broadband networks. The proposed mobile terminal framework is leading to high performance opportunities for multimedia services with high level of QoS provisioning and secure...
In the process of big data analysis and processing, a key concern blocking users from storing and processing their data in the cloud is their misgivings about the security and performance of cloud services. There is an urgent need to develop an approach that can help each cloud service provider (CSP) to demonstrate that their infrastructure and service behavior can meet the users' expectations. However,...
Internet of Things (IoT) is an emerging subject which enables multiple applications and requires robust security solutions. IoT architectures contribute to critical aspects of our society like transportation, health-care, industry, telecommunications and many others. Security is difficult to be implemented in the IoT context because the embedded devices are resource constrained and deployed in uncontrolled...
This paper considers a cellular multiple-input single- output (MISO) system overheard by multiple eavesdroppers, in the presence of one pair of device- to-device (D2D) nodes working as an underlay to the cellular network. A novel eavesdropping scenario is studied in this paper, where the eavesdroppers intend to simultaneously overhear the cellular communication as well as the D2D communication. Assuming...
This paper studies heuristic search-based optimization of service compositions. We have investigated applying Genetic Algorithms (GA) to optimize service-oriented architectures (SOA) in terms of security goals and cost, we help software Engineers to map the optimized service composition to the business process model based on security and cost. Service composition security risk is measured by implementing...
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.