18 research outputs found

    All-IP wireless sensor networks for real-time patient monitoring

    Get PDF
    AbstractThis paper proposes the all-IP WSNs (wireless sensor networks) for real-time patient monitoring. In this paper, the all-IP WSN architecture based on gateway trees is proposed and the hierarchical address structure is presented. Based on this architecture, the all-IP WSN can perform routing without route discovery. Moreover, a mobile node is always identified by a home address and it does not need to be configured with a care-of address during the mobility process, so the communication disruption caused by the address change is avoided. Through the proposed scheme, a physician can monitor the vital signs of a patient at any time and at any places, and according to the IPv6 address he can also obtain the location information of the patient in order to perform effective and timely treatment. Finally, the proposed scheme is evaluated based on the simulation, and the simulation data indicate that the proposed scheme might effectively reduce the communication delay and control cost, and lower the packet loss rate

    Orf virus DNA prime-protein boost strategy is superior to adenovirus-based vaccination in mice and sheep

    Get PDF
    Contagious ecthyma (Orf), an acute and highly contagious zoonosis, is prevalent worldwide. Orf is caused by Orf virus (ORFV), which mainly infects sheep/goats and humans. Therefore, effective and safe vaccination strategies for Orf prevention are needed. Although immunization with single-type Orf vaccines has been tested, heterologous prime-boost strategies still need to be studied. In the present study, ORFV B2L and F1L were selected as immunogens, based on which DNA, subunit and adenovirus vaccine candidates were generated. Of note, heterologous immunization strategies using DNA prime-protein boost and DNA prime-adenovirus boost in mice were performed, with single-type vaccines as controls. We have found that the DNA prime-protein boost strategy induces stronger humoral and cellular immune responses than DNA prime-adenovirus boost strategy in mice, which was confirmed by the changes in specific antibodies, lymphocyte proliferation and cytokine expression. Importantly, this observation was also confirmed when these heterologous immunization strategies were performed in sheep. In summary, by comparing the two immune strategies, we found that DNA prime-protein boost strategy can induce a better immune response, which provides a new attempt for exploring Orf immunization strategy

    A secure IPv6 address configuration protocol for vehicular networks

    Get PDF
    This paper proposes a secure address configuration protocol for IPv6-based vehicular networks. In this protocol, the network architecture is proposed. In this architecture, a vehicle obtains a unique address from a neighbor vehicle or an access point without DAD, and a leaving vehicle\u27s address space can be automatically reclaimed for reassignment. Based on this architecture, the address configuration algorithm is presented. In this algorithm, an access point or a vehicle owns the unique address space and assigns a unique address to a neighbor vehicle without DAD, so the address configuration cost and delay are lowered. The identification of a vehicle can be authenticated, so the security is achieved. This paper evaluates the performance of this protocol. The data results show that this protocol effectively improves the address configuration performance. 2014 Springer Science+Business Media New York

    E 2 T: End-to-End Tunnelling Extension to Mobile IPv6

    No full text
    In the standard Mobile IPv6 (MIPv6), the bidirectional tunnelling through the home agent or the route optimization show inefficiency in per-packet routing, especially when both communicating endpoints are mobile. To be scalable and compatible, mobile devices ’ packets should be routed efficiently with minimal changes to the network infrastructure. However, the current solutions do not provide any means for the end systems to perform optimized packet routing during the operation of the mobile devices. In this paper, we present an end-to-end tunnelling extension to MIPv6 (E2T) for mobile routing packets, which reduces the per-packet routing cost for the communications of mobile devices through the lower packet routing overhead. Besides, our approach requires little change to MIPv6, but allows the more efficient routing behavior with the shorter end-to-end transmission latency between communicating endpoints. The simulation results show our approach is suitable for real-time multimedia applications. I

    E 2 T: End-to-End Tunneling Extension

    No full text
    Abstract — In the standard Mobile IPv6, route optimization or bidirectional tunnelling through the home agent show inefficiency in per-packet forwarding, especially when both communicating endpoints are mobile. To be scalable and compatible, mobile devices ’ packets should be forwarded in a way with minimal changes to the network infrastructure. However, the current solutions do not provide any means for the end systems to perform optimized packet routing during the operation of mobile devices. In this paper, following a performance analysis of Mobile IPv6 routing mechanisms, we present the E 2 T- an extension to Mobile IPv6 for routing packets. It reduces per-packet forwarding cost for the communications of mobile devices. With this approach, packets are routed thorough end-to-end tunnelling between communicating endpoints, which requires little change to Mobile IPv6, but allows more efficient forwarding behavior. The numerical analysis and simulation results show it requires less overhead than the standard route optimization and it helps to achieve a low end-to-end traffic delay. Index Terms — Mobile IPv6, internetworking, mobility management, routing I
    corecore