20,221 research outputs found
Security in Wireless Sensor Networks: Issues and Challenges
Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.Comment: 6 page
Blindspot: Indistinguishable Anonymous Communications
Communication anonymity is a key requirement for individuals under targeted
surveillance. Practical anonymous communications also require
indistinguishability - an adversary should be unable to distinguish between
anonymised and non-anonymised traffic for a given user. We propose Blindspot, a
design for high-latency anonymous communications that offers
indistinguishability and unobservability under a (qualified) global active
adversary. Blindspot creates anonymous routes between sender-receiver pairs by
subliminally encoding messages within the pre-existing communication behaviour
of users within a social network. Specifically, the organic image sharing
behaviour of users. Thus channel bandwidth depends on the intensity of image
sharing behaviour of users along a route. A major challenge we successfully
overcome is that routing must be accomplished in the face of significant
restrictions - channel bandwidth is stochastic. We show that conventional
social network routing strategies do not work. To solve this problem, we
propose a novel routing algorithm. We evaluate Blindspot using a real-world
dataset. We find that it delivers reasonable results for applications requiring
low-volume unobservable communication.Comment: 13 Page
Mobile-Based Video Caching Architecture Based on Billboard Manager
Video streaming services are very popular today. Increasingly, users can now
access multimedia applications and video playback wirelessly on their mobile
devices. However, a significant challenge remains in ensuring smooth and
uninterrupted transmission of almost any size of video file over a 3G network,
and as quickly as possible in order to optimize bandwidth consumption. In this
paper, we propose to position our Billboard Manager to provide an optimal
transmission rate to enable smooth video playback to a mobile device user
connected to a 3G network. Our work focuses on serving user requests by mobile
operators from cached resource managed by Billboard Manager, and transmitting
the video files from this pool. The aim is to reduce the load placed on
bandwidth resources of a mobile operator by routing away as much user requests
away from the internet for having to search a video and, subsequently, if
located, have it transferred back to the user.Comment: 8 pages, 1 figure, GridCom-201
How to Solve the Fronthaul Traffic Congestion Problem in H-CRAN?
The design of efficient wireless fronthaul connections for future heterogeneous networks incorporating emerging paradigms such as heterogeneous cloud radio access network (H-CRAN) has become a challenging task that requires the most effective utilization of fronthaul network resources. In this paper, we propose and analyze possible solutions to facilitate the fronthaul traffic congestion in the scenario of Coordinated Multi-Point (CoMP) for 5G cellular traffic which is expected to reach ZetaByte by 2017. In particular, we propose to use distributed compression to reduce the fronthaul traffic for H-CRAN. Unlike the conventional approach where each coordinating point quantizes and forwards its own observation to the processing centre, these observations are compressed before forwarding. At the processing centre, the decompression of the observations and the decoding of the user messages are conducted in a joint manner. Our results reveal that, in both dense and ultra-dense urban small cell deployment scenarios, the usage of distributed compression can efficiently reduce the required fronthaul rate by more than 50% via joint operation
Electronic Social Networks as Supporting Means of Educational Process in Higher Education Institutions
Given research describes experience of electronic social networks use in educational practices. It was determined that electronic social networks can be a powerful tool for support of educational process in higher education institutions, namely to support study of different disciplines. There are main advantages of electronic social networks use for education: universal accessibility and free of charge; possibility of instant messaging and multimedia data; user-friendly intuitive interface; ability to search data and information; availability of event scheduling, invitations, reminder settings; support for synchronous and asynchronous communication between network members; access from different devices. It is emphasized that one of the main advantages of electronic social networks is receipt of quick feedback and convenience of their tools and services. Nowadays, it is important to include network educational interaction in existing models of study organization. It is advisable to use electronic social networks to manage educational process in higher education institution. Efficiency of electronic social networks use depends on intensity and need for their use in educational system management for implementation of organizational, educational, psychological and pedagogical
functions and ensuring universal communication with subjects of educational process. Expediency of electronic social networks use to carry out research work at university is described. Electronic social networks are convenient tool to conduct surveys and questionnaires, to create thematic groups for specific issue discussion. Also it is possible to interact with researchers from different countries, share experiences and disseminate research findings, invite those who wish to participate in various scientific activities using these networks
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines
Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective.
The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines.
From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research
- …