The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an online spatiotemporal data-driven methodology to detect malicious cyber attacks that target power system balancing and frequency control. The anomaly detection, which spots abnormal generator behavioral patterns in real time, is achieved locally at a power plant with peer to peer communication capability. We mainly consider the data integrity attack targeting Automatic...
Quality of service and quality of experience are of increasingly interest for successful communication network applications, particularly for decentralized networks, such as peer-to-peer (p2p) networks. They need sophisticated monitoring mechanisms to be able to adapt the system's parameters to maintain a certain level of quality of service. In the literature, several well-studied approaches, classified...
Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify...
Recommendation Systems are an important tool for aiding discovery of content such as movies, books, and music. Generating personalised recommendations that deliver serendipitous suggestions to the user is a key factor in determining user satisfaction. In this paper, we propose a recommendation algorithm that uses a community-structure based link prediction approach. The proposed link prediction algorithm...
This publication presents a novel concept for securing P2P-based M2M applications using the integration of a trust management system. In addition, this publication presents different security problems inside the P2P-based M2M application (P2P4M2M) framework and evaluates P2P protocols based on security. Furthermore, this paper emphasises the importance of trust for ensuring security. This is done...
Overlay multicast is regarded as a promising way for distributing file or live stream during recent years. In this paper, we reinforce an optimal DAGs (directed acyclic graphs) construction algorithm by relaxing its partitioning and sorting conditions. We employ a realistic topology (CERNET2 backbone) to evaluate several typical types of optimal DAGs in terms of the underlay performance metrics. Simulation...
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
Existing registries organize functionally similar services into groups without considering past service-usage from the consumers' perspective, a.k.a. pragmatics. Pragmatics can help registries to calculate service similarity more effectively and improve organization schemes. However, pragmatics are not available beforehand and their highly accumulated number over time creates time and space efficiency...
When two nodes in an opportunistic network meet, a utility function is generally employed to select the data that have to be exchanged between them, in order to maximize the chance of message delivery and to minimize congestion. The utility function computes weighted sums of various parameters, such as node centrality, similarity, trust, etc. Most of the existing solutions pre-compute the weights...
Video on Demand (VoD) streaming makes up an increasing portion of global IP traffic. Traditionally, data is served by content providers directly, putting a huge network load on the servers. We propose using our WebRTC-based protocols WebPeer and CodedWebPeer to create a P2P-assisted VoD streaming system with network coding. We introduce two metrics: network health to measure overall data saturation...
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the face of potential failures, accidents, and malicious...
A novel approach of a testbed for embedded networking nodes has been conceptualized and implemented. It is based on the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes are running in parallel and are connected via so-called virtual interfaces. The presented approach is very efficient and allows a simple description of test cases without...
Improve of the overall network efficiency between source and destination relay selection and interference free communication is important criteria in WSN. In this paper we are proposing SON based algorithm capable of simultaneous Scheduling and Routing in WSN. The proposes scheme contains the three stages, in first stage the sensor nodes are classified into different clusters and each nodes having...
Analyzing social iterations in a scientific environment will assist researchers in expanding their collaborative networks. Scientific social networks represent the researchers' social iterations in an academic environment. The analysis of these networks requires a detailed study of their structure and it is important the use of visual resources in order to a better understanding of how the social...
The design of routing protocols for opportunistic networks (OppNets) generally assume that some cooperation prevail between the nodes. But, in the presence of non-collaborative attacks such as supernova and hypernova, the routing operations become a challenge. This paper proposes a defense mechanism against the misbehavior of supernova and hypernova nodes in an OppNet running Epidemic and ProPHet...
Motivated by the increasing trend of storing data for web applications in fast NoSQL systems, in this paper, we experiment with the leading NoSQL datastore — Cassandra — and a latest generation re-design of Cassandra — ScyllaDB — meant to deliver bleeding-edge performance on modern multicore machines. We evaluate the scalability claim of ScyllaDB, in terms of the number of clients, and provide diagnostic...
Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resource-demanding, we can not give for granted that it can be computed in real time at every change...
This paper presents an effective content replication scheme for peer-to-peer online social networks (P2P-OSN). The topology of P2P-OSN is defined by the social network of the participants. P2P-OSN allow people to share content and run applications with their 1-hop friends in decentralized fashion, while denying access to their potentially private data to other users. Content replication in these networks...
Exascale networks are expected to comprise a significant part of the total monetary cost and 10-20% of the power budget allocated to exascale systems. Yet, our understanding of current and emerging workloads on these networks is limited. Left ignored, this knowledge gap likely will translate into missed opportunities for (1) improved application performance and (2) decreased power and monetary costs...
The design of a trust management framework in a mobile ad hoc network and its various components to protect against different attacks has a significant impact upon the performance of the secure routing protocol which is meant to form the most reliable route for data delivery. Specifically, the current work focuses upon the impact of certain parameters specific to two components within the proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.