1,651 research outputs found

    De-ossifying the Internet Transport Layer : A Survey and Future Perspectives

    Get PDF
    ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher PD

    Raising the Datagram API to Support Transport Protocol Evolution

    Get PDF
    Some application developers can wield huge resources to build new transport protocols, for these developers the present UDP Socket API is perfectly fine. They have access to large test beds and sophisticated tools. Many developers do not have these resources. This paper presents a new high-level Datagram API that is for everyone else, this has an advantage of offering a clear evolutionary path to support new requirements. This new API is needed to move forward the base of the system, allowing developers with limited resources to evolve their applications while accessing new network services

    Dynamic Channel Access Scheme for Interference Mitigation in Relay-assisted Intra-WBANs

    Full text link
    This work addresses problems related to interference mitigation in a single wireless body area network (WBAN). In this paper, We propose a distributed \textit{C}ombined carrier sense multiple access with collision avoidance (CSMA/CA) with \textit{F}lexible time division multiple access (\textit{T}DMA) scheme for \textit{I}nterference \textit{M}itigation in relay-assisted intra-WBAN, namely, CFTIM. In CFTIM scheme, non interfering sources (transmitters) use CSMA/CA to communicate with relays. Whilst, high interfering sources and best relays use flexible TDMA to communicate with coordinator (C) through using stable channels. Simulation results of the proposed scheme are compared to other schemes and consequently CFTIM scheme outperforms in all cases. These results prove that the proposed scheme mitigates interference, extends WBAN energy lifetime and improves the throughput. To further reduce the interference level, we analytically show that the outage probability can be effectively reduced to the minimal.Comment: 2015 IEEE International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France. arXiv admin note: text overlap with arXiv:1602.0865

    Application of MIH for the Lightweight Deployment of LTE-Advanced Systems through Mobile Relaying

    Full text link
    [ES] Evaluación del uso de relays móviles Wifi en tecnología LTE-Advanced[EN] Evaluation of Wifi Mobile Relaying in LTE-Advanced SystemsGualda Romero, P. (2012). Application of MIH for the Lightweight Deployment of LTE-Advanced Systems through Mobile Relaying. http://hdl.handle.net/10251/27176.Archivo delegad

    Fast recovery from node compromise in wireless sensor networks

    Full text link
    Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.<br /

    SABRE: Protecting Bitcoin against Routing Attacks

    Full text link
    Routing attacks remain practically effective in the Internet today as existing countermeasures either fail to provide protection guarantees or are not easily deployable. Blockchain systems are particularly vulnerable to such attacks as they rely on Internet-wide communication to reach consensus. In particular, Bitcoin -the most widely-used cryptocurrency- can be split in half by any AS-level adversary using BGP hijacking. In this paper, we present SABRE, a secure and scalable Bitcoin relay network which relays blocks worldwide through a set of connections that are resilient to routing attacks. SABRE runs alongside the existing peer-to-peer network and is easily deployable. As a critical system, SABRE design is highly resilient and can efficiently handle high bandwidth loads, including Denial of Service attacks. We built SABRE around two key technical insights. First, we leverage fundamental properties of inter-domain routing (BGP) policies to host relay nodes: (i) in locations that are inherently protected against routing attacks; and (ii) on paths that are economically preferred by the majority of Bitcoin clients. These properties are generic and can be used to protect other Blockchain-based systems. Second, we leverage the fact that relaying blocks is communication-heavy, not computation-heavy. This enables us to offload most of the relay operations to programmable network hardware (using the P4 programming language). Thanks to this hardware/software co-design, SABRE nodes operate seamlessly under high load while mitigating the effects of malicious clients. We present a complete implementation of SABRE together with an extensive evaluation. Our results demonstrate that SABRE is effective at securing Bitcoin against routing attacks, even with deployments as small as 6 nodes

    Project based learning on industrial informatics: applying IoT to urban garden

    Get PDF
    Copyright (c) 2018 IEEEThe fast evolution of technologies forces teachers to trade content off for self-learning. PBL is one of the best ways to promote self-learning and simultaneously boost motivation. In this paper, we present our experience introducing project-based learning in the last year subject. New Internet of Things (IoT) topic allows us to carry out complete projects, integrating different technologies and tools. Moreover, the selection of open-source and standard free technologies makes easy and cheap the access to hardware and software platforms used. We carefully have picked communication, data management, and programming tools that we think would be attractive to our students. They can start making fast prototyping with little initial skills and, at the same time, these are serious and popular tools widely used in the industry. In this paper, we report on the design of a project-based learning for our course and the impact this has on the student satisfaction and motivation. Surveys taught us that tuning the courses towards developing real projects on the field, has a large impact on acceptance, learning objectives achievements and motivation towards the course content.”I Plan Propio Integral de Docencia de la Universidad de Málaga” y Proyecto de Innovación Educativa PIE17/085, de la Universidad de Málaga. Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
    corecore