95 research outputs found
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
A hybrid network/host mobility management scheme for next generation networks
Includes bibliographical references.The author proposes a hybrid network/host interworking scheme to allow the MN to transition smoothly between different access networks supporting two distinct mobility approaches
Network emulation focusing on QoS-Oriented satellite communication
This chapter proposes network emulation basics and a complete case study of QoS-oriented Satellite Communication
Segurança e privacidade em terminologia de rede
Security and Privacy are now at the forefront of modern concerns, and drive
a significant part of the debate on digital society. One particular aspect that
holds significant bearing in these two topics is the naming of resources in the
network, because it directly impacts how networks work, but also affects how
security mechanisms are implemented and what are the privacy implications
of metadata disclosure. This issue is further exacerbated by interoperability
mechanisms that imply this information is increasingly available regardless of
the intended scope.
This work focuses on the implications of naming with regards to security and
privacy in namespaces used in network protocols. In particular on the imple-
mentation of solutions that provide additional security through naming policies
or increase privacy. To achieve this, different techniques are used to either
embed security information in existing namespaces or to minimise privacy ex-
posure. The former allows bootstraping secure transport protocols on top of
insecure discovery protocols, while the later introduces privacy policies as part
of name assignment and resolution.
The main vehicle for implementation of these solutions are general purpose
protocols and services, however there is a strong parallel with ongoing re-
search topics that leverage name resolution systems for interoperability such
as the Internet of Things (IoT) and Information Centric Networks (ICN), where
these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus-
são sobre a sociedade digital. Um aspecto particularmente subtil nesta dis-
cussão é a forma como atribuímos nomes a recursos na rede, uma escolha
com consequências práticas no funcionamento dos diferentes protocols de
rede, na forma como se implementam diferentes mecanismos de segurança
e na privacidade das várias partes envolvidas. Este problema torna-se ainda
mais significativo quando se considera que, para promover a interoperabili-
dade entre diferentes redes, mecanismos autónomos tornam esta informação
acessível em contextos que vão para lá do que era pretendido.
Esta tese foca-se nas consequências de diferentes políticas de atribuição de
nomes no contexto de diferentes protocols de rede, para efeitos de segurança
e privacidade. Com base no estudo deste problema, são propostas soluções
que, através de diferentes políticas de atribuição de nomes, permitem introdu-
zir mecanismos de segurança adicionais ou mitigar problemas de privacidade
em diferentes protocolos. Isto resulta na implementação de mecanismos de
segurança sobre protocolos de descoberta inseguros, assim como na intro-
dução de mecanismos de atribuiçao e resolução de nomes que se focam na
protecçao da privacidade.
O principal veículo para a implementação destas soluções é através de ser-
viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas
soluções extende-se também a outros tópicos de investigação que recorrem
a mecanismos de resolução de nomes para implementar soluções de intero-
perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na
informação (ICN).Programa Doutoral em Informátic
Actas da 10ª Conferência sobre Redes de Computadores
Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio
IPv6 tactical network management
Current and emerging technologies and equipment, such as unmanned aerial vehicles, ground sensors, networked radios, operator-worn sensor vests, and nanotechnology applications offer warfighters unprecedented command and control and information detection capabilities, yet the use of this technology has not been fully realized. The current protocol, IPv4, is incapable of providing enough addresses due to a depletion of IPv4 address space. IPv6, however, offers unprecedented network support for tactical-level sensor and communications assets in terms of increased address space, Quality of Service (QoS), flexibility, and security. The Department of Defense is transitioning from IPv4 to IPv6 in order to capitalize on IPv6's expanded capabilities. However, one unresolved area is proper IPv6 network management. Currently, the majority of the configuration and operational knowledge is in the mind of a very few individuals. The expertise currently available must be developed for application by the tactical network manager operating out on the edge of the network, in order to properly administer both an IPv4/IPv6 dual stacked network during the phased protocol transition and a purely native IPv6 network. Second, IPv6 features a robust Quality of Service (QoS) capability previously unavailable through IPv4, which requires research to determine the optimum configuration to support the warfighter's diverse requirements.http://archive.org/details/ipvtacticalnetwo109454574Outstanding ThesisUS Marine Corps (USMC) author.Approved for public release; distribution is unlimited
EVALUATING THE CYBER SECURITY IN THE INTERNET OF THINGS: SMART HOME VULNERABILITIES
The need for advanced cyber security measures and strategies is attributed to modern sophistication of cyber-attacks and intense media attention when attacks and breaches occur. In May 2014, a congressional report suggested that Americans used approximately 500 million Internet-capable devices at home, including, but not limited to Smartphones, tablets, and other Internet-connected devices, which run various unimpeded applications. Owing to this high level of connectivity, our home environment is not immune to the cyber-attack paradigm; rather, the home has evolved to become one of the most influenced markets where the Internet of Things has had extensive surfaces, vectors for attacks, and unanswered security concerns. Thus, the aim of the present research was to investigate behavioral heuristics of the Internet of Things by adopting an exploratory multiple case study approach. A controlled Internet of Things ecosystem was constructed consisting of real-life data observed during a typical life cycle of initial configuration and average use. The information obtained during the course of this study involved the systematic acquisition and analysis of Smart Home ecosystem link-layer protocol data units (PDUs). The methodology employed during this study involved a recursive multiple case study evaluation of the Smart Home ecosystem data-link layer PDUs and aligned the case studies to the existing Intrusion Kill Chain design model. The proposed solution emerging from the case studies builds the appropriate data collection template while concurrently developing a Security as a Service (SECaaS) capability to evaluate collected results
The VPQ scheduler in access point for VoIP over WLAN
The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication.VoIP is seen as a short-term and long-trem transmission for voice and audio traffic. Meanwhile, VoIP is moving on Wireless Local Area Networks (WLANs) based on IEEE 802.11 standards.Currently, there are many packet scheduling algorithms for real-time transmission over network.Unfortunately, the current scheduling will not be able to handle the VoIP packets with the proper manner and they have some drawbacks over real-time applications.The objective of this research is to propose a new Voice Priority Queue (VPQ) packet scheduling and algorithm to ensure more throughput, fairness and efficient packet scheduling for VoIP performance of queues and traffics.A new scheduler flexible which is capable of satisfying the VoIP traffic flows.Experimental topologies on NS-2 network simulator were analyzed for voice traffic. Preliminary results show that this can achieve maximum and more accurate VoIP quality throughput and fairness index in access point for VoIP over WLANs.We verified and validated VPQ an extensive experimental simulation study under various traffic flows over WLANs
- …