38,761 research outputs found

    Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc networks are formed spontaneously to use the wireless medium for communication among nodes. Each node in this type of network is its own authority and has an unpredictable behaviour. These features involve a cooperation challenge that has been addressed in previous proposals with methods based on virtual currencies. In this work, those methods have been simulated in NS-2 and the results have been analyzed, showing several weaknesses. In particular, it has been concluded that existent methods do not provide significant advances compared with networks without any mechanism for promoting cooperation. Consequently, this work presents three new proposals that try to solve those problems. The obtained results show that the new proposals offer significant improvements over previous schemes based on virtual currencies

    Incentives in peer-to-peer and grid networking

    Get PDF
    Today, most peer-to-peer networks are based on the assumptionthat the participating nodes are cooperative. Thisworks if the nodes are indifferent or ignorant about the resourcesthey offer, but limits the usability of peer-to-peernetworks to very few scenarios. It specifically excludes theirusage in any non-cooperative peer-to-peer environment, beit Grid networks or mobile ad-hoc networks. By introducingsoft incentives to offer resources to other nodes, we seean overall performance gain in traditional file-sharing networks.We also see soft incentives promoting the convergenceof peer-to-peer and Grid networks, as they increasethe predictability of the participating nodes, and thereforethe reliability of the services provided by the system as awhole. Reliability is what is required by Grid networks, butmissing in peer-to-peer networks

    Mobile Online Gaming via Resource Sharing

    Full text link
    Mobile gaming presents a number of main issues which remain open. These are concerned mainly with connectivity, computational capacities, memory and battery constraints. In this paper, we discuss the design of a fully distributed approach for the support of mobile Multiplayer Online Games (MOGs). In mobile environments, several features might be exploited to enable resource sharing among multiple devices / game consoles owned by different mobile users. We show the advantages of trading computing / networking facilities among mobile players. This operation mode opens a wide number of interesting sharing scenarios, thus promoting the deployment of novel mobile online games. In particular, once mobile nodes make their resource available for the community, it becomes possible to distribute the software modules that compose the game engine. This allows to distribute the workload for the game advancement management. We claim that resource sharing is in unison with the idea of ludic activity that is behind MOGs. Hence, such schemes can be profitably employed in these contexts.Comment: Proceedings of 3nd ICST/CREATE-NET Workshop on DIstributed SImulation and Online gaming (DISIO 2012). In conjunction with SIMUTools 2012. Desenzano, Italy, March 2012. ISBN: 978-1-936968-47-

    Managed ecosystems of networked objects

    Get PDF
    Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities these devices bring. In this paper, we evaluate the current efforts to integrate sensors and actuators into the Internet and identify the limitations at the level of cooperation of these Internet-connected objects and the possible intelligence at the end points. As a solution, we propose the concept of Managed Ecosystem of Networked Objects, which aims to create a smart network architecture for groups of Internet-connected objects by combining network virtualization and clean-slate end-to-end protocol design. The concept maps to many real-life scenarios and should empower application developers to use sensor data in an easy and natural way. At the same time, the concept introduces many new challenging research problems, but their realization could offer a meaningful contribution to the realization of the Internet of Things

    Reflections on the triple-helix as a vehicle to stimulate innovation in technology and security : a Belgian case study

    Get PDF
    In this contribution the main argument is that a triple helix collaboration between industry, government and knowledge institutes can be a vehicle to stimulate innovation and technology in the field of safety and security. To underpin this argument the significance of the evolution from a state model to a triple-helix model is described as well as the paradigm of open innovation that is a necessary condition for the triple-helix model. Relying on experiences since 2014 with the Belgian Innovation Centre for Security reflections are made on the dynamics of the triple-helix collaboration taking into account its creation, objectives, ambition, methodology, partners and funding. Some of the (perceived) barriers encountered and logics used by government, as one of the ‘hesitating’ participants in the triple-helix collaboration, are further discussed

    Multilevel Fiscal Governance in a Balanced Policy Environment

    Get PDF
    The most desirable system of allocations should avoid effi ciency losses, resulting from either fi nancial dependency, or subnational fi scal operations by striking a balance between fi scal autonomy and reliance on federal transfers of SNGs.fiscal federalism; intergovernmental relations; tax policy; fiscal governance.

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges
    • …
    corecore