2,013 research outputs found
Practical issues for the implementation of survivability and recovery techniques in optical networks
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives
The development of the Internet of Drones (IoD) becomes vital because of a
proliferation of drone-based civilian or military applications. The IoD based
technological revolution upgrades the current Internet environment into a more
pervasive and ubiquitous world. IoD is capable of enhancing the
state-of-the-art for drones while leveraging services from the existing
cellular networks. Irrespective to a vast domain and range of applications, IoD
is vulnerable to malicious attacks over open-air radio space. Due to increasing
threats and attacks, there has been a lot of attention on deploying security
measures for IoD networks. In this paper, critical threats and vulnerabilities
of IoD are presented. Moreover, taxonomy is created to classify attacks based
on the threats and vulnerabilities associated with the networking of drone and
their incorporation in the existing cellular setups. In addition, this article
summarizes the challenges and research directions to be followed for the
security of IoD.Comment: 13 pages, 3 Figures, 1 Table, The 3rd International Symposium on
Mobile Internet Security (MobiSec'18), Auguest 29-September 1, 2018, Cebu,
Philippines, Article No. 37, pp. 1-1
Algorithms for advance bandwidth reservation in media production networks
Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results
Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks
This dissertation focuses on the development of routing algorithms for secure and trusted routing in wireless ad hoc and sensor network. The first paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivability of the wireless network...The second paper analyzes both OLSR and TLR in terms of survivability and reliability to emphasize the improved performance of the network in terms of lifetime and proper delivery of data...The third paper proposes a statistical reputation model that uses the watchdog mechanism to observe the cooperation of the neighboring nodes...The last paper presents the results of the hardware implementation of Energy-Efficient Hybrid Key Management --Abstract, page iv
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
Decentralized systems are a subset of distributed systems where multiple
authorities control different components and no authority is fully trusted by
all. This implies that any component in a decentralized system is potentially
adversarial. We revise fifteen years of research on decentralization and
privacy, and provide an overview of key systems, as well as key insights for
designers of future systems. We show that decentralized designs can enhance
privacy, integrity, and availability but also require careful trade-offs in
terms of system complexity, properties provided, and degree of
decentralization. These trade-offs need to be understood and navigated by
designers. We argue that a combination of insights from cryptography,
distributed systems, and mechanism design, aligned with the development of
adequate incentives, are necessary to build scalable and successful
privacy-preserving decentralized systems
- …