19 research outputs found

    [untitled]

    Get PDF
    Panel: Why I Write What I Write and How I Write I

    Using Economic Model To Improve The Performance Of BHR Dynamic Replication Algorithm.

    Get PDF
    In grid computing environment, data is often replicated on many different sites to reduce access time. Static replication fixes the number of replicas whereas dynamic replication adapts to the demands of the grid by reducing or increasing the number of replicas or even moving the location of a replica to another site

    A Simple Data Dependency Analyzer For C Programs.

    Get PDF
    Data dependencies that exist in a sequential program are a major hindrance towards parallelization

    Data Transfer Management In Grid-Based Mass Storage Environment.

    Get PDF
    The drastic increase in the data requirements of scientific applications and collaborative research has resulted of transferring a large amount of data among participating sites

    Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols

    No full text
    Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks

    Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks

    No full text
    The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads, end-to-end delay, and average per-hop one-way delay in comparison to the BLE mesh (flooding) protocol and AODV protocol for all three scenarios (linear topology with ten nodes, multipath topology with six and ten nodes). In addition, the proposed protocol exhibited practically constant route requests and route reply setup times. Furthermore, the proposed protocol demonstrated a better Packet Delivery Ratio (PDR) for O-AODV (84%) in comparison to AODV (71%), but lower than the PDR of the mesh (flooding) protocol with 93%
    corecore