4 research outputs found

    Wireless Sensor Networks: Challenges Ahead

    Get PDF
    The aim of this paper is to analyze the different Wireless Sensor Network (WSN) transport protocols byidentifying various experimental parameters in order to undertake a comparative evaluation. To build the groundwork, we first discuss the generic design for a transport protocol based on three key concepts; congestion control, reliability support and priority support. The basis of this design was developed by assessing several aspects of numerous transport protocols. However they all using different set of parameters and settings and hence it is difficult to benchmark one against the other. In this paper, we discuss the simulation settings like packet size, number of exploited sensors and their distribution in the field, buffer size, coverage area and power levels

    Wireless Sensor Network Transport Protocol - A State of the Art

    Get PDF
    In this article, we present a survey of Wireless Sensor Networks (WSNs) existing Transport Protocols. Wehave evaluated the design concepts of different protocols based on congestion control, reliability support and source traffic priority support. Then we draw the concluding remarks, while highlighting up-and-coming research challenges for WSN transport protocols, which should be addressed further in prospective designs

    Modeling input validation in UML

    Get PDF
    Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part ofsoftware security that is not covered in the design phase of software development life-cycle resulting in many security vulnerabilities. Our objective is to extend UML to new integrated jramework for model driven security engineering leading to ideal way to design more secure software. Input validation in UML has not been addressed previously, hence we incorporate input validation into UML diagrams such as use case, class, sequence and activity. This approach has some advantages such as preventing jrom common input tampering attacks, having both security and convenience in software at high level of abstraction and ability of solving the problem ofweak security backgroundfor developers

    Definition of Spam 2.0: New Spamming Boom

    Get PDF
    The most widely recognized form of spam is e-mail spam, however the term “spam” is used to describe similarabuses in other media and mediums. Spam 2.0 (or Web 2.0 Spam) is refereed to as spam content that is hosted on online Web 2.0 applications. In this paper: we provide a definition of Spam 2.0, identify and explain different entities within Spam 2.0, discuss new difficulties associated with Spam 2.0, outline its significance, and list possible countermeasure. The aim of this paper is to provide the reader with a complete understanding of this new form of spamming
    corecore