3,014 research outputs found
Internet of Things Communication Reference Model and Traffic Engineer System (TES)
Abstract. One of the biggest challenges facing Internet of is the existing infrastructure of Internet and its mechanism of action. This paper proposes a new system, which sends the full Internet best path (between source and destination objects) to source object on IoT. This will help data of source object to reach its final destination object faster. This system saves most of recalculation of the Internet best paths again and again in the Internet Routers during a data trip. The authors call this system Traffic Engineer System (TES). The most important effect of this system is that it changes the form of "Internet of Things Communication Reference Model". This paper merges two addressing layers (IP/ID and Link) from this model in one new layer; where routers transition data through one address and the data have its full best path
A flow-based intrusion detection framework for internet of things networks
The application of the Internet of Things concept in domains such as industrial control, building automation, human health,
and environmental monitoring, introduces new privacy and security challenges. Consequently, traditional implementation
of monitoring and security mechanisms cannot always be presently feasible and adequate due to the number of IoT devices,
their heterogeneity and the typical limitations of their technical specifications. In this paper, we propose an IP flow-based
Intrusion Detection System (IDS) framework to monitor and protect IoT networks from external and internal threats in
real-time. The proposed framework collects IP flows from an IoT network and analyses them in order to monitor and detect
attacks, intrusions, and other types of anomalies at different IoT architecture layers based on some flow features instead of
using packet headers fields and their payload. The proposed framework was designed to consider both the IoT network
architecture and other IoT contextual characteristics such as scalability, heterogeneity, interoperability, and the minimization
of the use of IoT networks resources. The proposed IDS framework is network-based and relies on a hybrid
architecture, as it involves both centralized analysis and distributed data collection components. In terms of detection
method, the framework uses a specification-based approach drawn on normal traffic specifications. The experimental
results show that this framework can achieve & 100% success and 0% of false positives in detection of intrusions and
anomalies. In terms of performance and scalability in the operation of the IDS components, we study and compare it with
three different conventional IDS (Snort, Suricata, and Zeek) and the results demonstrate that the proposed solution can
consume fewer computational resources (CPU, RAM, and persistent memory) when compared to those conventional IDS.This work was supported by Portuguese national
funds through the FCT—Foundation for Science and Technology,
I.P., under the project UID/CEC/04524/2019info:eu-repo/semantics/publishedVersio
Numerical aerodynamic simulation program long haul communications prototype
This document is a report of the Numerical Aerodynamic Simulation (NAS) Long Haul Communications Prototype (LHCP). It describes the accomplishments of the LHCP group, presents the results from all LHCP experiments and testing activities, makes recommendations for present and future LHCP activities, and evaluates the remote workstation accesses from Langley Research Center, Lewis Research Center, and Colorado State University to Ames Research Center. The report is the final effort of the Long Haul (Wideband) Communications Prototype Plan (PT-1133-02-N00), 3 October 1985, which defined the requirements for the development, test, and operation of the LHCP network and was the plan used to evaluate the remote user bandwidth requirements for the Numerical Aerodynamic Simulation Processing System Network
Recommended from our members
Mundane is the New Radical: The Resurgence of Energy Megaprojects and Implications for the Global South [Opinion]
Product Development within Artificial Intelligence, Ethics and Legal Risk
This open-access-book synthesizes a supportive developer checklist considering sustainable Team and agile Project Management in the challenge of Artificial Intelligence and limits of image recognition. The study bases on technical, ethical, and legal requirements with examples concerning autonomous vehicles. As the first of its kind, it analyzes all reported car accidents state wide (1.28 million) over a 10-year period. Integrating of highly sensitive international court rulings and growing consumer expectations make this book a helpful guide for product and team development from initial concept until market launch
Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission
The aim of this thesis is to present a new shaped Variable Bit Rate (VBR) for video transmission, which plays a crucial role in delivering video traffic over the Internet. This is due to the surge of video media applications over the Internet and the video typically has the characteristic of a highly bursty traffic, which leads to the Internet bandwidth fluctuation. This new shaped algorithm, referred to as Slight Delay - Shaped Variable Bit Rate (SD-SVBR), is aimed at controlling the video rate for video application transmission. It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). SVBR algorithm is devised for real-time video applications and it has several limitations and weaknesses due to its embedded estimation or prediction processes. SVBR faces several problems, such as the occurrence of unwanted sharp decrease in data rate, buffer overflow, the existence of a low data rate, and the generation of a cyclical negative fluctuation. The new algorithm is capable of producing a high data rate and at the same time a better quantization parameter (QP) stability video sequence. In
addition, the data rate is shaped efficiently to prevent unwanted sharp increment or decrement, and to avoid buffer overflow. To achieve the aim, SD-SVBR has three strategies, which are processing the next Group of Picture (GoP) video sequence and obtaining the QP-to-data rate list, dimensioning the data rate to a higher utilization of the leaky-bucket, and implementing a QP smoothing method by carefully measuring the effects of following the previous QP value. However, this algorithm has to be combined with a network feedback algorithm to produce a better overall video rate control. A combination of several video clips, which consisted of a varied video rate, has been used for the purpose of evaluating SD-SVBR performance. The results showed that SD-SVBR gains an impressive overall Peak Signal-to-Noise Ratio (PSNR) value. In addition, in almost all cases, it gains a high video rate but without buffer overflow, utilizes the buffer well, and interestingly, it is still able to obtain smoother QP fluctuation
Introducing the new paradigm of Social Dispersed Computing: Applications, Technologies and Challenges
[EN] If last decade viewed computational services as a utility then surely
this decade has transformed computation into a commodity. Computation
is now progressively integrated into the physical networks in
a seamless way that enables cyber-physical systems (CPS) and the
Internet of Things (IoT) meet their latency requirements. Similar to
the concept of ¿platform as a service¿ or ¿software as a service¿, both
cloudlets and fog computing have found their own use cases. Edge
devices (that we call end or user devices for disambiguation) play the
role of personal computers, dedicated to a user and to a set of correlated
applications. In this new scenario, the boundaries between
the network node, the sensor, and the actuator are blurring, driven
primarily by the computation power of IoT nodes like single board
computers and the smartphones. The bigger data generated in this
type of networks needs clever, scalable, and possibly decentralized
computing solutions that can scale independently as required. Any
node can be seen as part of a graph, with the capacity to serve as a
computing or network router node, or both. Complex applications can
possibly be distributed over this graph or network of nodes to improve
the overall performance like the amount of data processed over time.
In this paper, we identify this new computing paradigm that we call
Social Dispersed Computing, analyzing key themes in it that includes
a new outlook on its relation to agent based applications. We architect
this new paradigm by providing supportive application examples that
include next generation electrical energy distribution networks, next
generation mobility services for transportation, and applications for
distributed analysis and identification of non-recurring traffic congestion
in cities. The paper analyzes the existing computing paradigms
(e.g., cloud, fog, edge, mobile edge, social, etc.), solving the ambiguity
of their definitions; and analyzes and discusses the relevant foundational
software technologies, the remaining challenges, and research
opportunities.Garcia Valls, MS.; Dubey, A.; Botti, V. (2018). Introducing the new paradigm of Social Dispersed Computing: Applications, Technologies and Challenges. Journal of Systems Architecture. 91:83-102. https://doi.org/10.1016/j.sysarc.2018.05.007S831029
- …