1,305 Hits in 5.2 sec

Warkitting: The Drive-by Subversion of Wireless Home Routers

Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel
2006 Journal of Digital Forensic Practice  
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients.  ...  We discuss how to detect a warkitting attack in progress and show how to analyze warkitted routers for evidence linking it to the attackers.  ...  One experiment that used high levels of contextual information finds a victim rate as high as 19% [?] .  ... 
doi:10.1080/15567280600995832 fatcat:lxhuofrxffaqpcqm2to5ov7eri

Contextual Awareness Service of Internet of Things User Interaction Mode in Intelligent Environment

Lingling Song, Qiangyi Li
2022 Advances in Multimedia  
and effect of the situational awareness system, take the elderly home care behavior as the research object, collect the 28-day home behavior of the elderly as sample data, and divide it into 7-day data  ...  In order to reduce the difficulty of the Internet of Things intelligent environment system to provide users with layout services and optimize the system structure, this paper proposes to design a context-aware  ...  He proposed a context-aware and IoT-oriented intelligent interaction architecture and constructed an intelligent interaction and contextual expression model in the IoT environment.  ... 
doi:10.1155/2022/2466032 fatcat:2ikyeimayfd6lpyx4kp5wqbdle

Real Tournament – mobile context‐aware gaming for the next generation

Maomao Wu, Keith Mitchell, Duncan McCaffery, Joe Finney, Adrian Friday
2004 Electronic library  
The proposed game, named Real Tournament, gathers real-time contextual information, e.g., physical location and orientation, from the players and injects them into the game engine to generate game events  ...  With the recent advances in mobile networking, context-aware computing, and sensor-based computing, researchers and game designers are able to explore the potential of combining these new technologies  ...  The most obvious example of real world artefacts is the player, whose contextual information, e.g., location, orientation, and status, is used to augment the virtual game environment of other users.  ... 
doi:10.1108/02640470410520113 fatcat:w6st7uv5gzdh5fq6jdrjnh4uye

Home Appliances Energy Consumption Control Using Internet of Things (IoT)

2020 jecet  
The system when routed through the IP address enable easy access to the appliances at home from distant locations.  ...  Upon connection then User interface were developed to interact with the system that allows user to easily control these home appliances through the internet.  ...  Furthermore, the research recommended that for a thorough experience of IoT benefits this particular work should be expanded to include home network of sensors so that data about the environment can be  ... 
doi:10.24214/jecet.b.9.3.26170 fatcat:lpzr632bbrap5frl77wpsjggha

An open virtual multi-services networking architecture for the future internet

May El Barachi, Nadjia Kara, Sleiman Rabah, Mathieu Forgues
2015 Journal of Internet Services and Applications  
Several important findings were made in the course of this work; one is that service-oriented concepts can be used to build open, flexible, and collaborative virtual networking environments.  ...  Network virtualization is considered as a promising way to overcome the limitations and fight the gradual ossification of the current Internet infrastructure.  ...  Acknowledgement This paper is an extended version of the article presented at IEEE CCNC 2012, under the title of "Open Virtual Playground: Initial Architecture and Results".  ... 
doi:10.1186/s13174-015-0019-3 fatcat:taseqfzdybe6zg7i7tiimr2hla

Policy-Driven Mobile Agents for Context-Aware Service in Next Generation Networks [chapter]

Kun Yang, Alex Galis
2003 Lecture Notes in Computer Science  
A thorough consistency is expected to be achieved by this allpolicy method where policies are well planned to cover from context representation through services down to the underlying networks.  ...  In order to bring together the different advantages of various wireless technologies and wired networks, solution from service's perspective is critical.  ...  The IST programme is partially funded by the Commission of the European Union.  ... 
doi:10.1007/978-3-540-39646-8_11 fatcat:qxv2qw7a3jdzdd5rtue4u2fmte

Privacy-Enhancing Context Authentication from Location-Sensitive Data [article]

Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas
2019 arXiv   pre-print
The resulting hashes provide a dimensionality reduction of the underlying data, which we leverage to model users' behaviour for authentication using machine learning.  ...  We present how ConSec supports learning from categorical and numerical data, while addressing a number of on-device and network-based threats.  ...  ACKNOWLEDGMENTS The authors would like to thank other members of the OneSpan Innovation Centre-Paul Dunphy, Andreas Gutmann, Sharon Lee, Steven J.  ... 
arXiv:1904.08800v2 fatcat:mmlisv3nwzcnfpsabkkynbvs4m

Design and Simulation of IoT Systems Using the Cisco Packet Tracer

Norman Gwangwava, Tinashe B. Mubvirwi
2021 Advances in Internet of Things  
The article uses Cisco packet tracer 7.2 version, which consists of four subcategories of smart things-home, smart city, industrial and power grid, to design an IoT based control system for a fertilizer  ...  The parameters need to be monitored in order to ensure quality, safety, and efficiency.  ...  Conflicts of Interest Authors declare no conflict of interest regarding the publication of this paper.  ... 
doi:10.4236/ait.2021.112005 fatcat:dpceihkh4zfhznxq2m2fpkp73a

Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation

Steven Latré, Jeroen Famaey, John Strassner, Filip De Turck
2013 Journal of Network and Computer Applications  
The current manual management of services and applications in today's telecommunication networks is becoming increasingly complicated.  ...  These distributed management elements need to collaborate with each other to ensure end-to-end quality guarantees.  ...  The service provider can use its own access network, consisting of caches, access routers and access nodes to stream the videos to its customers, residing in the home network.  ... 
doi:10.1016/j.jnca.2013.01.011 fatcat:yxgc7iafgfgr3fjoehzsw3c4fu

Context-Aware Personalization for Smart Mobile Cloud Services [chapter]

Waldemar Hummer, Stefan Schulte
2016 Lecture Notes in Computer Science  
With the rapid advances in sensor technology, distributed software architectures and backend infrastructures need to be able to systematically deal with increasing amounts of real-time context data.  ...  The advent of the Internet of Things and the increasing sensorization of smart devices that surround us in our everyday lives are spurring the demand for context-aware applications to offer personalized  ...  Acknowledgements This work is partially supported by the European Union within the SIMPLI-CITY FP7-ICT project (Grant agreement no. 318201).  ... 
doi:10.1007/978-3-662-50539-7_14 fatcat:p4zepofivzgzjcameyfwo7xeem

Understanding the social impact of ICN: between myth and reality

G. Piro, S. Signorello, M. R. Palattella, L. A. Grieco, G. Boggia, T. Engel
2016 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
Finally, the work highlights design principles and core components to build ICN-enabled network devices.  ...  The Information Centric Networking (ICN) paradigm is attracting more and more interest from the research community due to its peculiarities that make it one of the best candidates for constructing the  ...  , and by the CoSDN project, INTER/POLLUX/12/4434480, and the IDSECOM project, INTER/POLLUX/13/6450335, both funded by the Fonds National de la Recherche Luxembourg.  ... 
doi:10.1007/s00146-016-0649-4 fatcat:wxq63vrhgvdanignf3wwx5jdbq

Trends in entertainment, home automation and e-health: Toward cross-domain integration

Antonio Aragues, Ignacio Martinez, Pilar Valle, Pilar Munoz, Javier Escayola, Jesus Trigo
2012 IEEE Communications Magazine  
Recent advances in consumer networking and emerging technologies are promoting a paradigm shift in the way environments such as entertainment, home automation or e-Health are traditionally understood.  ...  The work is completed with a reasoned discussion on trends on architectural approaches to cross-domain integration that can be used to overcome the issues generated by the segmented ecosystems presented  ...  -277 Plan Avanza I+D of the Ministerio de Industria, Turismo y Comercio (MITyC), PI029/09 of the Gobierno de Aragón.  ... 
doi:10.1109/mcom.2012.6211501 fatcat:u4dsfqj4prapxhiuefj2gwkrwi

A conceptual-driven survey on future internet requirements, technologies, and challenges

Antonio Marcos Alberti
2013 Journal of the Brazilian Computer Society  
issues to be addressed in future work.  ...  Nowadays, research initiatives to redesign the Internet are popping up around the world. Each of these projects has a particular focus and its own set of design requirements and key technologies.  ...  Acknowledgments The author thanks INATEL for the research support.  ... 
doi:10.1007/s13173-013-0101-2 fatcat:5akftmotn5b6nm5t4erk7thq7y

Architectures for the future networks and the next generation Internet: A survey

Subharthi Paul, Jianli Pan, Raj Jain
2011 Computer Communications  
Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the  ...  Delay/disruption tolerant networks which allow communications even when complete end-to-end path is not available are also discussed.  ...  Relationship-Oriented Networking The basic goal of the Relationship-Oriented Networking project [5] is to build a network architecture that makes use of secure cryptographic identities to establish relationships  ... 
doi:10.1016/j.comcom.2010.08.001 fatcat:xjfqlqwv6vbjpbd5op5kgseofy

Whither Edge Computing?-A Futuristic Review

M.A. Jayaram, Hasan Fleyeh
2018 International Journal of Applied Research on Information Technology and Computing  
This feature is all about inserting computing power and storage in the vicinity of the network edge.  ...  Hand-in-hand, mobile networks and data networks are converging into cloud computing bandwagon.  ...  Smart Home and Smart City through Edge Currently, the gadgets such as smart light, smart TV, smart sensors, robot vacuum and others are connected to the cloud to run smart home environment.  ... 
doi:10.5958/0975-8089.2018.00019.2 fatcat:fhxrrhiinzehzj7c3s7b3qea6y
« Previous Showing results 1 — 15 out of 1,305 results