Filters








16,420 Hits in 3.7 sec

Random Tree Multicast Communications in Reconfigurable Network

Kaixiang Huang, Yue Chen, Julong Lan, Hongyong Jia
2016 International Journal of Future Generation Communication and Networking  
To increase the security of multicast, a Random Tree Multicast (RTM) scheme in reconfigurable network was presented.  ...  Just like the idea of MTD that prevents the malicious hosts from tracing and joining the group, Chen. [33] suggested a multicast scheme by changing the group address in the SSM channel at nonfixed periods  ...  This paper proposes a random tree multicast (RTM) scheme for the reconfigurable networks.  ... 
doi:10.14257/ijfgcn.2016.9.1.01 fatcat:57vjy437izfh5p5bfxgwjo3lsq

Energy Efficient and Secured Data Dissemination in Wsn

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, a novel Secure Based Dissemination protocol is proposed which can provide energy efficient data dissemination.  ...  Data dissemination is a high level application service, provided to WSN to update the configuration parameter to make the node perform intended services.  ...  In their scheme the reliable data delivery strategy is used when a forwarding node fails. In this strategy, sink constructs a grid when no valid grid is present in the sensor field.  ... 
doi:10.35940/ijitee.b6306.129219 fatcat:xgbtcjoccvbuznlcwi6453qgwa

FPGA implementation cost and performance evaluation of the IEEE 802.16e and IEEE 802.11i security architectures based on AES-CCM

Ignacio Algredo-Badillo, Claudia Feregrino-Uribe, Rene Cumplido, Miguel Morales-Sandoval
2008 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control  
Security is a key element for using software radios, because they can enter to different wireless networks and use the air like transmission medium, being vulnerable to possible attacks to the transmission  ...  In this work, hardware implementations of these architectures are evaluated in terms of FPGA implementation costs and performance to be considered in a reconfigurable hardware platform, which supports  ...  This platform is based on a reconfigurable architecture, executing security services.  ... 
doi:10.1109/iceee.2008.4723408 fatcat:es3cyer45fge3angol4i57ofpu

To Propose a Mobility Based Reconfigurable System under Disaster Management in WSN

Isha Sharma
2016 IOSR Journal of Electronics and Communication Engineering  
There is a direct communication between head & nodes. It provides a multi-hop routing based on shortest path in wireless networks. It provides a complete path with the loss of some packets.  ...  In this work, it proposes mobility based dynamic reconfiguration system in WSN.  ...  In FACTS these constructs are used to support an event-condition action based middleware.  ... 
doi:10.9790/2834-150109097 fatcat:hvcggmhdx5gavbsbsqwmiuyo2e

SMART: An Optical Infrastructure for Future Internet

S. Q. Zheng, Ashwin Gumaste
2006 2006 3rd International Conference on Broadband Communications, Networks and Systems  
A new scalable optical network infrastructure SMART is proposed based on light-trails and hypernetwork architecture.  ...  The underlying physical network of SMART is a reconfigurable WDM network with reconfigurability distributed over network nodes.  ...  Our proposed architecture, called Scalable Multi-Access Reconfigurable Transport (SMART) network, is based on an extension of the now popular light-trail scheme and a new nodal architecture for implementing  ... 
doi:10.1109/broadnets.2006.4374309 dblp:conf/broadnets/ZhengG06 fatcat:i3qt3zwn3ffeph76gif6iow62q

Energy-efficient virtual network embedding in networks for cloud computing

Xiang Wei Zheng, Bin Hu, Dian Jie Lu, Zhen Hua Chen, Hong Liu
2017 International Journal of Web and Grid Services  
Cloud computing is based on several service models such as Network as a Service (NaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS).  ...  Furthermore, a reconfiguration algorithm is developed to improve the utility of fragmented resources. X-W. Zheng et al.  ...  Construct a VN set based on a physical node.3 Search virtual nodes.  ... 
doi:10.1504/ijwgs.2017.082058 fatcat:y32m6xgz2raixk6ymws72io2jy

Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

Dongkyun Kim, Yong-Hwan Kim, Ki-Hyun Kim, Joon-Min Gil
2017 Sustainability  
Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN.  ...  SD-WAN infrastructure (KREONET-S) which is deployed on the advanced national research network in Korea, and (2) Mininet-based experimental and emulated networks.  ...  In this regard, we propose a selective VDN reconfiguration scheme considering the above four requirements based on pre-calculated VDN information.  ... 
doi:10.3390/su9122382 fatcat:g7xl2mnzlvg4hltukxr62xkubq

Dynamic Architectural Constraints Monitoring and Reconfiguration in Service Architectures [chapter]

Jose John, MingXue Wang, Claus Pahl
2010 Lecture Notes in Computer Science  
We concentrate on service replacement selection as a remedial strategy for a possible quality violation requiring architectural remedies.  ...  requiring architectural reconfigurations.  ...  Once an execution path is completed without faults, the path variable is assigned to 0 (path = 0) and the repeatUntil construct finishes. The Replacement Strategy.  ... 
doi:10.1007/978-3-642-15114-9_23 fatcat:e77tszea7fcmjcxn3w3biud4ne

Signal Strength based Self Reconfiguration to Ensure Reliability in Wireless Sensor Networks

M.A. Manivasagam, T.V Ananthan
2018 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we propose a strategy to adjust radios in the sensor network depending on the signal strength of the neighboring nodes to ensure reliability using self reconfiguration (S2R2).  ...  The stability of the route makes the route a valid one to send data.  ...  For that, a meta model of RWSN was formulated based on UML to describe a zone-based architecture that uses a communication protocol for the optimization of distributed reconfigurations.  ... 
doi:10.11591/ijeecs.v10.i2.pp725-732 fatcat:ihi7wbr45rgclo3gkzstt2oxai

Research on the Model Mechanism and Decision Management In the Evacuation Configuration Process Control

Li Wei, Zhang Ying
2014 International Journal of Control and Automation  
on a cooperative scheme, next relevant model mechanisms and configuration structure patterns are discussed, and moreover an evacuation knowledge decision flow is analyzed by adopting a knowledge management  ...  pattern, finally, the helpful efficiency of this method has been tested and verified with improved and better services.  ...  evacuation path measures.  ... 
doi:10.14257/ijca.2014.7.2.31 fatcat:sbt2zqqxwrcclau5vqwokkix34

An Approach for QoS Based Fault Reconfiguration in Service Oriented Architecture

Saurabh Shrivastava, Ashish Sharma, Deepika Shrivastava
2015 Procedia Computer Science  
Web services and service-oriented style of architecture becomes the basis for a new generation of distributed applications and system management tools.  ...  With such deployments, Quality of Service (QoS) properties such as response time, availability and service costs are in high demands for SOA-based interoperability.  ...  Jay et.al. 1 proposes approach for the construction of a reconfiguration region of every faulty service.  ... 
doi:10.1016/j.procs.2015.02.145 fatcat:cyr6qj6tqfdttkhft4woaksnfq

Traffic Redirection Attack Protection System (TRAPS) [chapter]

Vrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman
2005 IFIP Advances in Information and Communication Technology  
This paper introduces a novel mitigation scheme, TRAPS, whereby the victim verifies source address authenticity by performing reconfiguration for traffic redirection and informing high ongoing-traffic  ...  Distributed Denial of Service (DDoS) attackers typically use spoofed IP addresses to prevent exposing their identities and easy filtering of attack traffic.  ...  The Secure Overlay Services (SOS) [I81 architecture is constructed using a combination of secure overlay tunneling, routing via consistent hashing, and filtering.  ... 
doi:10.1007/0-387-25660-1_21 fatcat:upp3b5tddbayzpo3oi24odlqr4

Data Structures and Algorithms for Packet Forwarding and Classification

Sartaj Sahni
2009 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks  
call admission control in wireless cellular networks p. 945 Cross-layer flow control based on path capacity prediction for multi-hop ad hoc network p. 955 Constructing the robust and efficient  ...  on similarity multi-paths routing p. 345 Secure real-time transaction processing with timeliness guarantees in mobile distributed real-time database systems p. 358 A new data fusion model of intrusion  ... 
doi:10.1109/i-span.2009.122 dblp:conf/ispan/Sahni09 fatcat:p44oexvkrzbobdwhmrc4lkpglu

Breaker failure protection — Standalone or integrated with zone protection relays?

Bogdan Kasztenny, Michael J. Thompson
2011 2011 64th Annual Conference for Protective Relay Engineers  
This paper also reviews methods to improve the security of BF protection.  ...  In this context, the paper considers cost savings, security and dependability, simplicity, the danger of human errors when testing bus configurations, overall relaying philosophy, and reliability of applied  ...  Fig. 7 . 7 A variant of the Fig. 6 scheme when Zone 1 is a reconfigurable bus. Fig. 8 . 8 Securing a hard-wired BFI signal against battery ground faults.  ... 
doi:10.1109/cpre.2011.6035639 fatcat:4qs7dcjx55fslkddqybd4t5cym

Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things

Hussain Al-Aqrabi, Anju P. Johnson, Richard Hill
2019 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)  
a security protocol.  ...  We use, Physically Unclonable Functions (PUF), cryptographic hardware primitive which are based on a physical system having easy to evaluate, hard to predict and manufacturer resistant properties in developing  ...  reconfiguration in the dynamic part of the FPGA. 10: SAC-FPGA to U B : sends PUF modelling parameters 'm' through secure channel 11: U B constructs the mathematical model M B of the PUF P B from 'm'  ... 
doi:10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00049 dblp:conf/uic/Al-AqrabiJH19 fatcat:whchijjt7zfqbjrbvlb7vth5va
« Previous Showing results 1 — 15 out of 16,420 results