The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
Network Functions Virtualization (NFV) is a new network paradigm that has been strongly promoted from both scientific community and telecom industry, where network functions (NFs) such as firewalls, load balancers, gateways among others, are virtualized, isolated from middleboxes and housed on one or more industry standard computing nodes. One of the main challenges for service providers when they...
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
In the development of production systems, the engineering of Manufacturing Execution Systems poses a complex and time-consuming task. One of the specific tasks, which contribute to this fact, are the efforts necessary for the configuration of the shop floor gateway of an MES. In the past few years, a great number of promising approaches for the model-based systems engineering of production systems...
This paper presents a multi-layer distributed performance management model for Internet of Things (IoT) as a service for caregivers. Performance monitoring and control of IoT devices and services are vital functions for e-health systems. Cloud-based IoT systems with centralized data centers further underline the need for distributed management. The main contribution of this paper is a model and prototype...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
Recently, attempts have been made to change the paradigm of existing plants by applying ICT to the manufacturing industry. It can be seen as an extension of factory automation, which used to automate production facilities and unmanned work in the past, but Smart Factory is an advanced model to predict and respond to the future situation. In this paper, we propose a controller that is optimized for...
The state-of-practice for Internet of Things (IoT) applications is deployment on specialised networks of embedded devices connected to a cloud backend. While this paradigm has successfully supported a range of IoT systems, its power is limited by the high latency and bandwidth caused by communications with remote data servers and the inability to share specialised IoT infrastructure across applications...
More and more cyber-physical systems and the internet of things push for a multitude of devices and systems, which need to work together to provide the services as required by the users. Nevertheless, the speed of development and the heterogeneity of devices introduces considerable challenges in the development of such systems. This paper describes a solution being implemented in the setting of a...
Software Defined Networks (SDN) have been utilized in applications of the Internet of Things (IoT), termed as software-defined IoT network, because of the popularity and capability of mobile devices being used for networking in relatively large areas. In a software-defined IoT system, the sensing data are asynchronously harvested by the mobile sensing nodes, and are also asynchronously uploaded to...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
Today, Online Social Networks (OSNs) are ubiquitous means of communication. In order to prevent the misuse of personal user data by OSN providers, various research efforts have produced a multitude of approaches to decentralize OSNs in the past decade. The most critical challenge for these systems is to replace the infrastructure of centralized OSNs. That is, they need to handle the large amounts...
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
Nowadays multiple bus communication types are comprehensively employed to construct different networks in vehicles information system design. Data interchange among these networks must be conducted through complex communication gateways, which are difficult to test all the features wholly by manual work. MIC and RS422 communication networks are very common in some special vehicles, so in this paper...
With the advent of IoT technologies and standards, IoT services has become popular these days. To populate IoT service, collaboration of IoT services on service level is essential. From the viewpoint of application, most of interfaces of existing IoT services are proprietary, which induces vertical silo problem. In this paper, IoT application architecture to access multiple IoT services using fog...
In view of the current smart home comfort, human-computer interaction, cost, power consumption and other aspects of the problem, the ZigBee wireless sensor communication technique is adopted to form home data and control network. Combined with 3G/4G network technology, the intelligent home remote monitoring system is developed on the basis of embedded web gateway, cloud server and smart phone app...
In recent years, IoT has become a hot topic in many fields. Even in industrial fields, by utilizing IoT technology, it is expected to improve productivity, to reduce costs and to make better services. Therefore, we have developed IoT testbed to support utilization of IoT technology. The IoT testbed consists of an evaluation conveying system, data servers and communication network between them. We...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.