The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN) is a key emerging technology that enables networks to be programmed and dynamically reconfigured through software-based network applications. This programability also significantly increases the exposure of these networks to software application faults, which can compromise or crash the underlying SDN network. It is thus imperative to detect subtle faulty or malicious...
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective messaging protocol is a challenging and daunting task for any organisation because it depends on the nature of the IoT system and its messaging requirements. Copious messaging protocols have been developed...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
In this paper we propose a scheme that unconditional secure transmission is used to implement information reconciliation in key generation. Unconditional secure transmission achieved by associating MIMO beamforming with security code can be safe and reliable. Theoretically, the reconciliation and privacy amplification phase can take advantage of the unconditional communication security to reconciling...
Over the past decade, fast technological and industrial advances have been happening in the area of autonomous Systems of Systems (SoS). A SoS is built upon integration of several systems, where the complexity of such a structure is exponentially higher which brings challenges to its analysis. However, it also has provided a large set of new opportunities in domains such as air traffic control, defense,...
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt...
Internet of Things (IoT) depicts an intelligent future, where any IoT-based devices having a sensorial and computing capabilities to interact with each other. Recently, we are living in the area of internet and rapidly moving towards a smart planet where devices are capable to be connected to each other. Cooperative ad-hoc vehicle systems are the main driving force for the actualization of IoT-based...
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
In this paper, we investigate the secrecy performance of a cognitive untrusted relay network with a direct link using selection combining (SC) scheme, where a secondary source communicates with a secondary destination through an untrusted relay. We first examine the connection outage probability (COP) and secrecy outage probability (SOP) to investigate the reliability and security performance of the...
Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
The underlying variability in the ReRAM device operation, while undesired in many applications, can be advantageous for hardware security primitives. ReRAM devices also come with the advantage of having non-linear multi-state operation. By comparison with previous reported ReRAM PUFs, which utilized spatial variations in the devices' binary ON/OFF states, we proposed to use sneak path currents and...
Mobile money is an upshot of the conventional banking system that creates an opportunity for the financially excluded group of people. It allows the unbanked in the rural areas and the underbanked in the urban centers to have access to financial services. User experience is all encompassing as it affects the emotion and the attitude of the user of a product or services. This study reviewed the related...
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
The use of wireless technologies within factories demands a comprehensive understanding of the problems and potential solutions associated with the rigors of the manufacturing environment. A clearly defined problem space would significantly ease the selection and deployment of appropriate wireless solutions to connected factory systems. A mapping of potential technologies to classes of use cases within...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.