Netw. Protoc. Algorithms最新文献

筛选
英文 中文
Experimental Evaluation of a SDN-DMM Architecture 一种SDN-DMM架构的实验评估
Netw. Protoc. Algorithms Pub Date : 2018-06-28 DOI: 10.5296/npa.v10i2.13193
Rodrygo T. Cordova, P. Gondim, Jaime Lloret, J. M. Jiménez
{"title":"Experimental Evaluation of a SDN-DMM Architecture","authors":"Rodrygo T. Cordova, P. Gondim, Jaime Lloret, J. M. Jiménez","doi":"10.5296/npa.v10i2.13193","DOIUrl":"https://doi.org/10.5296/npa.v10i2.13193","url":null,"abstract":"Mobility management has become a great challenge due to the exponential growth in the number of devices that can connect to home or visited networks, and the need for providing seamless mobility in future generation networks. SDN-DMM (Software Defined Network Architecture for Distributed Mobility Management) architecture has been proposed [11], allowing to separate control and data planes, for the distributed mobility management through bidirectional IP flows. This article reports on aspects related to the implementation of SDN-DMM, conducted with metrics as packet loss, throughput and handover latency, considered in a comparison involving traditional routing and SDN-DMM. The results show the SDN approach not only provides the intrinsic benefits of SDN in comparison with traditional architectures, but also deals with the distributed mode of mobility management in heterogeneous access networks in a simplified and efficient way.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115724700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a WSN for smart irrigation in citrus plots with fault-tolerance and energy-saving algorithms 基于容错和节能算法的柑橘小区智能灌溉无线传感器网络设计
Netw. Protoc. Algorithms Pub Date : 2018-06-28 DOI: 10.5296/npa.v10i2.13205
L. Parra, Javier Rocher, Laura García, Jaime Lloret, Jesús Tomás, Óscar Romero, M. Rodilla, S. Falco, M. Sebastiá-Frasquet, J. Mengual, J. A. González, B. Roig
{"title":"Design of a WSN for smart irrigation in citrus plots with fault-tolerance and energy-saving algorithms","authors":"L. Parra, Javier Rocher, Laura García, Jaime Lloret, Jesús Tomás, Óscar Romero, M. Rodilla, S. Falco, M. Sebastiá-Frasquet, J. Mengual, J. A. González, B. Roig","doi":"10.5296/npa.v10i2.13205","DOIUrl":"https://doi.org/10.5296/npa.v10i2.13205","url":null,"abstract":"Wireless sensor networks are widely used for monitoring different processes, including agriculture, in order to reach sustainability. One of the keys to sustainable crops is water saving. In particular, saving water is extremely important in arid and semiarid regions. In those regions, citrus trees are cultivated, and drip irrigation is used to save water. In this paper, we propose a smart irrigation system for citrus trees using a WSN. We describe the employed sensors and nodes for this proposal. Next, we present the proposed architecture and the operational algorithms for the nodes. Moreover, we designed different algorithms for fault tolerance and energy saving functionalities. The energy saving algorithm is based on the relevance of the gathered data, which is analyzed in order to consider whether the information should be forwarded or not. A TPC-based protocol is proposed to perform the communication among the nodes of our system. In addition, we present different simulations of the proposed system. Particularly, we show the consumed bandwidth and the remaining energy in the different nodes. Finally, we test different energy configurations to evaluate the network lifetime and the remaining energy when the first node depletes its energy.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125733156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Botnet Forensic: Issues, Challenges and Good Practices 僵尸网络取证:问题、挑战和良好实践
Netw. Protoc. Algorithms Pub Date : 2018-06-28 DOI: 10.5296/npa.v10i2.13144
Anchit Bijalwan, Vijender Kumar Solanki, E. Pilli
{"title":"Botnet Forensic: Issues, Challenges and Good Practices","authors":"Anchit Bijalwan, Vijender Kumar Solanki, E. Pilli","doi":"10.5296/npa.v10i2.13144","DOIUrl":"https://doi.org/10.5296/npa.v10i2.13144","url":null,"abstract":"Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty. Such activities are direct attacks on the safety, security and confidentiality of the organization. These activities put organizational privacy at stake. Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks. The available observations can be utilized in future also to prevent a potential threat to network security. This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Relative Localization of Wireless Sensor Nodes by Using the RSSI Data 基于RSSI数据的无线传感器节点相对定位
Netw. Protoc. Algorithms Pub Date : 2018-04-01 DOI: 10.5296/npa.v10i1.11533
Turker Turkoral, O. Tamer, Suat Yetis, Enes Inac, L. Çetin
{"title":"Relative Localization of Wireless Sensor Nodes by Using the RSSI Data","authors":"Turker Turkoral, O. Tamer, Suat Yetis, Enes Inac, L. Çetin","doi":"10.5296/npa.v10i1.11533","DOIUrl":"https://doi.org/10.5296/npa.v10i1.11533","url":null,"abstract":"Wireless sensor network is an emerging research field and a crucial infrastructure for Internet of Things (IoT) applications. Sensor nodes of a wireless network may connect via different wireless technologies like Wi-Fi, Bluetooth, ZigBee or WiMAX. In many applications, like field monitoring or smart buildings, the location of the nodes with respect to a global or relative coordinate system is essential information. The main focus of this work is the localization of wireless sensor nodes, using the Received Signal Strength Indicator (RSSI) metric of the wireless telecommunication infrastructure. We present both simulation and measurement results of the proposed method and compare the results with similar work.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISCP: An Instantaneous and Secure Clustering Protocol for Wireless Sensor Networks 无线传感器网络的瞬时安全聚类协议
Netw. Protoc. Algorithms Pub Date : 2018-04-01 DOI: 10.5296/npa.v10i1.12574
Miguel Landry Foko Sindjoung, A. Bomgni, E. T. Fute, G. Chalhoub, C. T. Djamégni
{"title":"ISCP: An Instantaneous and Secure Clustering Protocol for Wireless Sensor Networks","authors":"Miguel Landry Foko Sindjoung, A. Bomgni, E. T. Fute, G. Chalhoub, C. T. Djamégni","doi":"10.5296/npa.v10i1.12574","DOIUrl":"https://doi.org/10.5296/npa.v10i1.12574","url":null,"abstract":"A Wireless Sensor Network (WSN) is an Ad-hoc network populated by small hand-held commodity devices, running on batteries called stations or sensors. These sensors are deployed in an area called a perception zone in order to study one or more phenomena. Generally, the perception zone is an area where access is almost impossible for humans. Given the absence of a previously defined infrastructure, deployed sensors need to organize themselves to ensure not only their connectivity but also effective management of their residual energy. This residual energy management is more important since we know that communications over long distances are always very energy-consuming for sensors, which most often do not have a secondary source of energy. Multi-hop communication is generally used to connect sensors in order to ensure efficient use of their energy. This being the case, multi-hop communication can be established by partitioning the network into clusters. In order to avoid malicious intrusions, all operations involved must be done in a secure manner. In this paper, we propose a secure clustering protocol which connects all the sensors of the network.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wireless Technologies for IoT in Smart Cities 智慧城市中物联网的无线技术
Netw. Protoc. Algorithms Pub Date : 2018-04-01 DOI: 10.5296/npa.v10i1.12798
Laura García, J. M. Jiménez, Miran Taha, Jaime Lloret
{"title":"Wireless Technologies for IoT in Smart Cities","authors":"Laura García, J. M. Jiménez, Miran Taha, Jaime Lloret","doi":"10.5296/npa.v10i1.12798","DOIUrl":"https://doi.org/10.5296/npa.v10i1.12798","url":null,"abstract":"As cities continue to grow, numerous initiatives for Smart Cities are being conducted. The concept of Smart City encompasses several concepts being governance, economy, management, infrastructure, technology and people. This means that a Smart City can have different communication needs. Wireless technologies such as WiFi, ZigBee, Bluetooth, WiMax, 4G or LTE have presented themselves as solutions to the communication needs of Smart City initiatives. However, as most of them employ unlicensed bands, interference and coexistence problems are increasing. In this paper, the wireless technologies available nowadays for IoT in Smart Cities are reviewed. Their characteristics and their adequacy to each domain is considered. The problems derived of over-crowded unlicensed spectrum and coexistence difficulties among each technology are discussed as well. Finally, power consumption concerns are addressed.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks 基于ssl的会话劫持攻击防护机制研究
Netw. Protoc. Algorithms Pub Date : 2018-04-01 DOI: 10.5296/npa.v10i1.12478
Md. Shohrab Hossain, Arnob Paul, Md. Hasanul Islam, Mohammed Atiquzzaman
{"title":"Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks","authors":"Md. Shohrab Hossain, Arnob Paul, Md. Hasanul Islam, Mohammed Atiquzzaman","doi":"10.5296/npa.v10i1.12478","DOIUrl":"https://doi.org/10.5296/npa.v10i1.12478","url":null,"abstract":"Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a  comprehensive survey of existing measures against SSL stripping-based session hijacking attacks and compare those measures. In this paper, we have classified all the existing preventive measures for SSL stripping-based session hijacking attacks into two main categories: client-side measures and serverside measures. We have illustrated the proposed solutions comprehensively with useful diagrams for clarification. We have also compared them based on different performance criteria. This paper will help web security researchers to have a comparative analysis of all solutions for the SSL stripping based attacks, thereby improving existing solutions to better protect the users from session hijacking attacks.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Intelligent Algorithm for Enhancing MPEG-DASH QoE in eMBMS eMBMS中提高MPEG-DASH QoE的智能算法
Netw. Protoc. Algorithms Pub Date : 2018-02-18 DOI: 10.5296/npa.v9i3-4.12573
Miran Taha, J. M. Jiménez, Alejandro Canovas, Jaime Lloret
{"title":"Intelligent Algorithm for Enhancing MPEG-DASH QoE in eMBMS","authors":"Miran Taha, J. M. Jiménez, Alejandro Canovas, Jaime Lloret","doi":"10.5296/npa.v9i3-4.12573","DOIUrl":"https://doi.org/10.5296/npa.v9i3-4.12573","url":null,"abstract":"Multimedia streaming is the most demanding and bandwidth hungry application in today’s world of Internet. MPEG-DASH as a video technology standard is designed for delivering live or on-demand streams in Internet to deliver best quality content with the fewest dropouts and least possible buffering. Hybrid architecture of DASH and eMBMS has attracted a great attention from the telecommunication industry and multimedia services. It is deployed in response to the immense demand in multimedia traffic. However, handover and limited available resources of the system affected on dropping segments of the adaptive video streaming in eMBMS and it creates an adverse impact on Quality of Experience (QoE), which is creating trouble for service providers and network providers towards delivering the service. In this paper, we derive a case study in eMBMS to approach to provide test measures evaluating MPEG-DASH QoE, by defining the metrics are influenced on QoE in eMBMS such as bandwidth and packet loss then we observe the objective metrics like stalling (number, duration and place), buffer length and accumulative video time. Moreover, we build a smart algorithm to predict rate of segments are lost in multicast adaptive video streaming. The algorithm deploys an estimation decision regards how to recover the lost segments. According to the obtained results based on our proposal algorithm, rate of lost segments is highly decreased by comparing to the traditional approach of MPEG-DASH multicast and unicast for high number of users.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121026923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
FlexiTop: a flexible and scalable network monitoring system for Over-The-Top services FlexiTop:一个灵活的、可扩展的网络监控系统,用于over - top服务
Netw. Protoc. Algorithms Pub Date : 2018-02-18 DOI: 10.5296/NPA.V9I3-4.12488
Daniel Perdices, J. D. Vergara, Paula Roquero, Carlos Vega, J. Aracil
{"title":"FlexiTop: a flexible and scalable network monitoring system for Over-The-Top services","authors":"Daniel Perdices, J. D. Vergara, Paula Roquero, Carlos Vega, J. Aracil","doi":"10.5296/NPA.V9I3-4.12488","DOIUrl":"https://doi.org/10.5296/NPA.V9I3-4.12488","url":null,"abstract":"Nowadays, the demand of Over-The-Top (OTT) services such as multimedia streaming, web services or social networking is rapidly increasing. Consequently, there is a wide interest in studying the quality of these services so that Internet Service Providers (ISP) can deliver the best experience to their clients. For this purpose, we present FlexiTop, a flexible and scalable system to actively monitor these OTT services, which allows an operator to obtain metrics with a limited resource usage. Due to the continuous evolution of OTT services, this system was designed with different approaches that can be extrapolated to future situations. By looking at the results, the proposal meets all the expectations and requirements and therefore it proves its success. The proposed design was implemented and validated with different alternatives whenever it was possible, both in wired and wireless networks. Moreover, long-time testing was performed to both ensure its stability and analyze the obtained data.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unmanned Aerial Vehicular System for Greenhouse Gas Measurement and Automatic Landing 温室气体测量与自动着陆无人机系统
Netw. Protoc. Algorithms Pub Date : 2018-02-18 DOI: 10.5296/npa.v9i3-4.12319
H. Ali, M. Odeh, Ahmed Odeh, A. Abou-Elnour, M. Tarique
{"title":"Unmanned Aerial Vehicular System for Greenhouse Gas Measurement and Automatic Landing","authors":"H. Ali, M. Odeh, Ahmed Odeh, A. Abou-Elnour, M. Tarique","doi":"10.5296/npa.v9i3-4.12319","DOIUrl":"https://doi.org/10.5296/npa.v9i3-4.12319","url":null,"abstract":"This paper presents a reliable and low cost greenhouse gas measurement system. The system mainly consists of an unmanned aerial vehicle (UAV), a set of calibrated sensors, a wireless system, and a microcontroller. The system can measure the concentration of greenhouse gases namely carbon dioxide (CO 2 ), methane (CH 4 ), and ozone (O 3 ) at different altitudes. It can also measure temperature, humidity, and atmospheric pressure. The system is able to send data to a remote monitoring station. The UAV is equipped with image processing based navigation and landing system so that it can land autonomously on a designated place. To ensure safe landing the system uses a specially designed parachute. This paper also presents some data generated by the system.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"149 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120908825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信