35 research outputs found

    Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Get PDF
    This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow

    Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership

    Get PDF
    Future networks everywhere will be connected to innumerable Internet-ready home appliances. A device accepting connections over a network must be able to verify the identity of a connecting device in order to prevent device spoofing and other malicious actions. In this paper, we propose a security mechanism for an inter-device communication. We state the importance of a distingushing and binding mechanism between a devices identity and its ownership information to realize practical inter-device authentication. In many conventional authentication systems, the relationship between the devices identity and the ownership information is not considered. Therefore, we propose a novel inter-device authentication framework guaranteeing this relationship. Our prototype implementation employs a smart card to maintain the devices identity, the ownership information and the access control rules securely. Our framework efficiently achieves secure inter-device authentication based on the devices identity, and authorization based on the ownership information related to the device. We also show how to apply our smart card system for inter-device authentication to the existing standard security protocols

    Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing

    No full text

    Regulated Assembly of the Transenvelope Protein Complex Required for Lipopolysaccharide Export

    No full text
    Gram-negative bacteria are impervious to many drugs and environmental stresses because they possess an outer membrane (OM) containing lipopolysaccharide (LPS). LPS is biosynthesized at the cytoplasmic (inner) membrane and is transported to the OM by an unknown mechanism involving the LPS transport proteins, LptA–G. These proteins have been proposed to form a bridge between the two membranes; however, it is not known how this bridge is assembled to prevent mistargeting of LPS. We use in vivo photo-cross-linking to reveal the specific protein–protein interaction sites that give rise to the Lpt bridge. We also show that the formation of this transenvelope bridge cannot proceed before the correct assembly of the LPS translocon in the OM. This ordered sequence of events may ensure that LPS is never transported to the OM if it cannot be translocated across it to the cell surface
    corecore