644,179 research outputs found

    IREEL: remote experimentation with real protocols and applications over emulated network

    Get PDF
    This paper presents a novel e-learning platform called IREEL. IREEL is a virtual laboratory allowing students to drive experiments with real Internet applications and end-to-end protocols in the context of networking courses. This platform consists in a remote network emulator offering a set of predefined applications and protocol mechanisms. Experimenters configure and control the emulation and the end-systems behavior in order to perform tests, measurements and observations on protocols or applications operating under controlled specific networking conditions. A set of end-to-end mechanisms, mainly focusing on transport and application level protocols, are currently available. IREEL is scalable and easy to use thanks to an ergonomic web interface

    Optimisation of routing protocols for Wireless Mesh Networks (WMNs) to achieve higher quality of service for real time applications

    Get PDF
    The existing routing protocols for WMNs (Wireless Mesh Networks) are extensions of protocols originally designed for Mobile Ad-hoc Networks (MANETs) and perform sub-optimally for the mesh connectivity of WMNs which degrades their performance in terms of increased latency in packet delivery, packet drops and decreased network throughput. The proposed research, currently at its inception, would investigate into capacity and limitations of current WMN routing protocols with respect to wireless technologies, platforms and relevant standards in context of routing requirements of identified real-time applications, namely, the disaster management and tele-health applications. The research would optimise the existing routing protocols for WMNs for the proposed applications to achieve higher quality of service, reliability and security of data access to meet their specialist requirements. Wireless Mesh Networks (WMNs) are increasingly being incorporated in disaster management solutions for access to information of disaster situation to improve effectiveness of rescue services. Currently, the routing requirements of disaster solution using WMN has been researched in context of active research project, “iSurvival- Mobile Mesh Networks for Disaster Management” , which utilises specialist applications on smart phones of end-users in the disaster area to establish WMNs using available heterogeneous wireless technologies from 3G, Wi-Fi, Bluetooth and others. These WMNs provide resilient and reconfigurable digital infrastructures, with users’ smart phones acting as routers in the connected mesh networks to facilitate routing and forwarding of information in the disaster are

    Quantum Information Complexity and Amortized Communication

    Full text link
    We define a new notion of information cost for quantum protocols, and a corresponding notion of quantum information complexity for bipartite quantum channels, and then investigate the properties of such quantities. These are the fully quantum generalizations of the analogous quantities for bipartite classical functions that have found many applications recently, in particular for proving communication complexity lower bounds. Our definition is strongly tied to the quantum state redistribution task. Previous attempts have been made to define such a quantity for quantum protocols, with particular applications in mind; our notion differs from these in many respects. First, it directly provides a lower bound on the quantum communication cost, independent of the number of rounds of the underlying protocol. Secondly, we provide an operational interpretation for quantum information complexity: we show that it is exactly equal to the amortized quantum communication complexity of a bipartite channel on a given state. This generalizes a result of Braverman and Rao to quantum protocols, and even strengthens the classical result in a bounded round scenario. Also, this provides an analogue of the Schumacher source compression theorem for interactive quantum protocols, and answers a question raised by Braverman. We also discuss some potential applications to quantum communication complexity lower bounds by specializing our definition for classical functions and inputs. Building on work of Jain, Radhakrishnan and Sen, we provide new evidence suggesting that the bounded round quantum communication complexity of the disjointness function is \Omega (n/M + M), for M-message protocols. This would match the best known upper bound.Comment: v1, 38 pages, 1 figur

    Narrowband delay tolerant protocols for WSN applications. Characterization and selection guide

    Get PDF
    This article focuses on delay tolerant protocols for Wireless Sensor Network (WSN) applications, considering both established and new protocols. We obtained a comparison of their characteristics by implementing all of them on an original platform for network simulation, and by testing their behavior on a common test-bench. Thereafter, matching the requirements linked to each application with the performances achieved in the test-bench, allowed us to define an application oriented protocol selection guide

    Composing security protocols: from confidentiality to privacy

    Get PDF
    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composition results, we derive some security properties on a protocol from the security analysis performed on each of its sub-protocols individually. We consider parallel composition and the case of key-exchange protocols. Our results apply to deal with confidentiality but also privacy-type properties (e.g. anonymity) expressed using a notion of equivalence. We illustrate the usefulness of our composition results on protocols from the 3G phone application and electronic passport

    On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard

    Full text link
    Wireless Body Area Networks (WBAN) support a variety of real-time health monitoring and consumer electronics applications. The latest international standard for WBAN is the IEEE 802.15.6. The security association in this standard includes four elliptic curve-based key agreement protocols that are used for generating a master key. In this paper, we challenge the security of the IEEE 802.15.6 standard by showing vulnerabilities of those four protocols to several attacks. We perform a security analysis on the protocols, and show that they all have security problems, and are vulnerable to different attacks

    Transfer of a quantum state from a photonic qubit to a gate-defined quantum dot

    Full text link
    Interconnecting well-functioning, scalable stationary qubits and photonic qubits could substantially advance quantum communication applications and serve to link future quantum processors. Here, we present two protocols for transferring the state of a photonic qubit to a single-spin and to a two-spin qubit hosted in gate-defined quantum dots (GDQD). Both protocols are based on using a localized exciton as intermediary between the photonic and the spin qubit. We use effective Hamiltonian models to describe the hybrid systems formed by the the exciton and the GDQDs and apply simple but realistic noise models to analyze the viability of the proposed protocols. Using realistic parameters, we find that the protocols can be completed with a success probability ranging between 85-97%
    corecore