Filters








4,754 Hits in 3.9 sec

Security in Wireless sensor network: Approaches and Issues

Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
2015 TELKOMNIKA Indonesian Journal of Electrical Engineering  
With increasing of this smart network popularity sensor network faced various challenges and threats.  ...  Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military.  ...  These metrics increase the computation time and end-to-end delay in network.  ... 
doi:10.11591/tijee.v15i3.1577 fatcat:4liqvbth4zekfa6tx2fdzufaau

Inferring Network Topologies in Infrastructure as a Service Cloud

Dominic Battré, Natalia Frejnik, Siddhant Goel, Odej Kao, Daniel Warneke
2011 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing  
Our inference approach relies on delay-based end-to-end measurements and can be combined with traditional IP-level topology information, if available.  ...  We propose an approach to infer the network topology connecting a set of virtual machines in IaaS clouds and exploit it for data-intensive distributed applications.  ...  ACKNOWLEDGMENT We thank HP for supporting this work through an Open Collaboration Grant.  ... 
doi:10.1109/ccgrid.2011.79 dblp:conf/ccgrid/BattreFGKW11 fatcat:t6xb6k2vf5hypi7kzaggpxscl4

Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

2013 IOSR Journal of Computer Engineering  
This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks.  ...  However, intruders with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.  ...  of the original plaintext, if one of the pseudo-messages is unknown, and (c) f and its inverse f−1 are efficiently computable.  ... 
doi:10.9790/0661-1514245 fatcat:jmhdzlczf5chbckeebm7uzq4sq

RouteNet: Leveraging Graph Neural Networks for network modeling and optimization in SDN [article]

Krzysztof Rusek, José Suárez-Varela, Paul Almasan, Pere Barlet-Ros, Albert Cabellos-Aparicio
2019 arXiv   pre-print
In our evaluation, we show that RouteNet is able to predict accurately the delay distribution (mean delay and jitter) and loss even in topologies, routing and traffic unseen in the training (worst case  ...  In this paper we propose RouteNet, a novel network model based on Graph Neural Network (GNN) that is able to understand the complex relationship between topology, routing and input traffic to produce accurate  ...  The generalization to unknown routings and traffic matrices in known topologies (NSF, Geant2 and Germany50) is almost perfect. The model is also equally accurate for the unknown topology (GBN).  ... 
arXiv:1910.01508v1 fatcat:nx6ty46pyffktlab7dakqqbzle

Adaptive Control Methodology for High-performance Low-power VLSI Design [chapter]

Se-Joong Lee
2009 Frontiers in Adaptive Control  
For example, Mesh topology shown in Figure 3 -(a) is a widely used network architecture for parallel computing systems, because of its beauty of symmetric shape, unique link length, and scalability with  ...  Figure 7 depicts how this mechanism is used to hide the propagation delay time.  ...  These include various robust techniques, performance enhancement techniques, techniques with less a-priori knowledge, nonlinear adaptive control techniques and intelligent adaptive techniques.  ... 
doi:10.5772/6437 fatcat:oaagbta4wvbtbll65bhtjnxzsy

Reduction of the Authentication Time using ECC and PBAS Approach in VANET

Nitish Kumar Bharti, Manoj Sindhwani
2016 Indian Journal of Science and Technology  
The simulation results show that proposed approach minimizes the authentication time, delay, packet loss due to the collision of the packet in the network and also increase the overall throughput of the  ...  network.  ...  These unknown certificates are related to some pseudo identity that is used to hide the actual identity of a vehicle.  ... 
doi:10.17485/ijst/2016/v9i37/93913 fatcat:avjpjqjhdvbatgv6stiegfplg4

Integrated Sdn/Nfv Management And Orchestration Architecture For Dynamic Deployment Of Virtual Sdn Control Instances For Virtual Tenant Networks

Raül Muñoz, Ricard Vilalta, Ramon Casellas, Ricardo Martínez, Thomas Szyrkowiec, Achim Autenrieth, Víctor López, Diego López
2015 Zenodo  
Software-defined networking (SDN) and network function virtualization (NFV) have emerged as the most promising candidates for improving network function and protocol programmability and dynamic adjustment  ...  This abstraction enables SDN to perform network virtualization, that is, to slice the physical infrastructure and create multiple coexisting application-specific virtual tenant networks (VTNs) with specific  ...  The former hides internal connectivity issues by representing the VTN topology as a single virtual node.  ... 
doi:10.5281/zenodo.46115 fatcat:yrw2w46rpfhfrnkpxpwhp5vkjq

Communications in unknown networks: Preserving the secret of topology

Markus Hinkelmann, Andreas Jakoby
2007 Theoretical Computer Science  
It will be shown that this is not possible for static networks and most kinds of dynamic networks.  ...  Finally, we investigate the problem of whether routing tables can be generated from the local knowledge of the processing nodes without losing the secrecy of the network topology with respect to the resulting  ...  Communication and computation in unknown and restricted networks The interplay of network topology and communication security has been studied extensively over the last decade.  ... 
doi:10.1016/j.tcs.2007.04.031 fatcat:7abaxjauhrcshibr73rolboipq

Communications in Unknown Networks: Preserving the Secret of Topology [chapter]

Markus Hinkelmann, Andreas Jakoby
2005 Lecture Notes in Computer Science  
It will be shown that this is not possible for static networks and most kinds of dynamic networks.  ...  Finally, we investigate the problem of whether routing tables can be generated from the local knowledge of the processing nodes without losing the secrecy of the network topology with respect to the resulting  ...  Communication and computation in unknown and restricted networks The interplay of network topology and communication security has been studied extensively over the last decade.  ... 
doi:10.1007/11429647_14 fatcat:6cbp4qaby5hnxbhaxafazilfqq

Analysis and Implementation of Practical, Cost-Effective Networks on Chips

Se-Joong Lee, Kangmin Lee, Hoi-Jun Yoo
2005 IEEE Design & Test of Computers  
Topology Protone uses a star topology. For Slim-spider, we used a hierarchical star topology that divides the network into local and global networks, both with the star topology.  ...  This implies that the star topology with a proper low-power link scheme can serve as a cost-effective global network architecture with nine or fewer clusters.  ...  His research interests include the theory, architecture, and VLSI design of highspeed network switches and on-chip interconnection networks.  ... 
doi:10.1109/mdt.2005.103 fatcat:gp6msxhvqbg47fvpqt5fg7einm

Shadow networks: Discovering hidden nodes with models of information flow [article]

James P. Bagrow, Suma Desu, Morgan R. Frank, Narine Manukyan, Lewis Mitchell, Andrew Reagan, Eric E. Bloedorn, Lashon B. Booker, Luther K. Branting, Michael J. Smith, Brian F. Tivnan, Christopher M. Danforth (+2 others)
2013 arXiv   pre-print
We use Symbolic Regression (SR) to learn models relating information flow to network topology.  ...  Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete.  ...  Acknowledgments The authors are grateful for the computational resources provided by the Vermont Advanced Computing Core which is supported by NASA (NNX 08A096G).  ... 
arXiv:1312.6122v1 fatcat:dlij36ncrrhslafeuarnuqio44

Traffic-aware Routing Protocol in VANET using Adaptive Autoregressive Crow Search Algorithm

2018 Journal of Networking and Communication Systems (JNACS)  
The analysis of the proposed algorithm is made and the performances are evaluated using the metrics, like End to End Delay (EED), average traffic density, distance, and throughput, which acquired with  ...  The traffic-aware routing in the geographical area is essential in Vehicular Ad Hoc Network (VANETs).  ...  with more reliable is a challenging task associated with the VANET network [10] .  ... 
doi:10.46253/jnacs.v1i1.a5 fatcat:i3t6bginzzdzpigewg2ipc3hpq

Playinghide-and-seek

Martin Chapman, Gareth Tyson, Peter McBurney, Michael Luck, Simon Parsons
2014 Proceedings of the 1st International Workshop on Agents and CyberSecurity - ACySE '14  
with the solution of real cyber issues.  ...  We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek.  ...  This would reduce the number of potential finders and delay the remaining ones. Thus, it is rational for him to consider each node as a hide location with equal probability: P (vi) = 1 n .  ... 
doi:10.1145/2602945.2602946 fatcat:6uysthkqcvgbtghzvtpxd4jrii

Multi-Domain Time-Sensitive Networks—Control Plane Mechanisms for Dynamic Inter-Domain Stream Configuration

Martin Böhm, Diederich Wermser
2021 Electronics  
Inter-domain communication in time-sensitive networks (TSN) has been identified as a requirement for various use cases.  ...  This paper presents control plane mechanisms for multi-domain time sensitive networks (MDTSNs) integrating an east–westbound protocol in the existing TSN control plane, in order to achieve multi-domain  ...  (a) Entire data plane topology; (b) Partially hided data plane topology as visible for E/W Manager of domain 1.  ... 
doi:10.3390/electronics10202477 fatcat:gd7kfxlhendfdot3p4yw5xwrhy

Packet-Hiding Methods for Preventing Selective Jamming Attacks

A. Proano, L. Lazos
2012 IEEE Transactions on Dependable and Secure Computing  
This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks.  ...  However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.  ...  Puzzles based on hashing-Computationally limited receivers can incur significant delay and energy consumption when dealing with modulo arithmetic.  ... 
doi:10.1109/tdsc.2011.41 fatcat:jn6dog2bjnaozl6jamkbxt33f4
« Previous Showing results 1 — 15 out of 4,754 results