{"title":"Resource-aware virtualization for industrial networks: A novel architecture combining resource management, policy control and network virtualization for networks in automation or supervisory control and data acquisition networks","authors":"Hans-Peter Huth, A. Houyou","doi":"10.5220/0004508900440050","DOIUrl":"https://doi.org/10.5220/0004508900440050","url":null,"abstract":"Within the EU Project IoT@Work future Internet techniques such as network virtualization are investigated in order to provide communication services in automation systems. The physical network is modeled as an abstract pool of resources that is allocated through virtual slices to different automation applications. Each slice of the network resources fulfils the application communication needs in terms of security, QoS, and reliability. The proposed architecture is targeted at constrained networks, where a centralized control and management point could be accessed through an API to create and implement virtual networks which could be mapped to a real physical infrastructure. This approach would impact not only the task of engineering by separating application programming from configuring networks. It also hides the network dynamics and self-management connecting ever more dynamic, adaptive and smart automation systems.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manuel Koschuch, Matthias Hudler, H. Eigner, Zsolt Saffer
{"title":"Token-based authentication for smartphones","authors":"Manuel Koschuch, Matthias Hudler, H. Eigner, Zsolt Saffer","doi":"10.5220/0004520000510056","DOIUrl":"https://doi.org/10.5220/0004520000510056","url":null,"abstract":"Due to short - but frequent - sessions of smartphone usage, the fast and easy usability of authentication mechanisms in this special environment has a big impact on user acceptance. In this work we propose a user-friendly alternative to common authentication methods (like PINs and patterns). The advantages of the proposed method are its security, fastness, and easy usage, requiring minimal user interaction compared to other authentication techniques currently used on smartphones. The mechanism described uses the presence of a Bluetooth-connected hardware-token to authenticate the user and can easily be implemented on current smartphones. It is based on an authentication protocol which meets the requirements on energy efficiency and limited resources by optimizing the communication effort. A prototype was implemented on an Android smartphone and an MSP430 based MCU. The token allows fast authentication without the need for additional user action. The entire authentication process can be completed in less than one second, the developed software prototype requires no soft- or hardware modifications (like rooting) of the Android phone.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards algorithm agility for wireless sensor networks: Comparison of the portability of selected Hash functions","authors":"Manuel Koschuch, Matthias Hudler, Zsolt Saffer","doi":"10.5220/0004612500640068","DOIUrl":"https://doi.org/10.5220/0004612500640068","url":null,"abstract":"Cryptographic hash functions are an important building block used in many cryptosystems. The flexibility and ability of a system designer to choose the most fitting function for a given system enables fast, efficient and secure designs. In this position paper we give preliminary results of porting three selected hash algorithms to Iris and MicaZ Sensor nodes in terms of achieved performance, memory requirements and the influence of different compiler optimizations on these measurements. Our main goal is to provide a sort of baseline approximation of how much effort is needed to port reference code of these algorithms to a new platform without trying to optimize it, leaving all this work to the compiler; enabling designers to not having to stick to already ported algorithms, when they might be suboptimally suited for a given environment.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new approach for detection of host identity in IPv6 networks","authors":"Libor Polcák, Martin Holkovic, P. Matoušek","doi":"10.5220/0004608700570063","DOIUrl":"https://doi.org/10.5220/0004608700570063","url":null,"abstract":"For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it is in IPv4. This paper presents a new approach to track IPv6 address assignments in LANs. The method is based on a study of implementation of IPv6 (mainly neighbor discovery) in current operating systems. The detection is passive for end devices and does not require any software or hardware modifications. In contrast with current methods, our approach does not poll routers in the network and works also in networks where IPv6 multicast is not broadcasted (active Multicast Listener Discovery snooping - MLD snooping). Moreover, our approach detects that an address is no longer used. The approach was successfully tested in a campus network.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121521480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HyVVE: A Voronoi based hybrid architecture for massively multiplayer on-line games","authors":"L. Ricci, Luca Genovali, Barbara Guidi","doi":"10.5220/0004531900150023","DOIUrl":"https://doi.org/10.5220/0004531900150023","url":null,"abstract":"Massively Multiplayer Online Games (MMOGs) have gained a lot of popularity in recent years. The problem of defining a proper architecture supporting MMOGs is still a research challenge because the classical client server architecture mainly adopted in commercial applications presents several drawbacks like unsatisfactory scalability and limited fault tolerance. This paper presents HyVVE (Hybrid Voronoi Virtual Environments), an hybrid architecture exploiting both server and P2P nodes. HyVVE exploits a Voronoi tessellation of the virtual world to distribute the load for the management of the virtual entities among the server and the peers. The paper presents a set of experimental results proving the effectiveness of our approach.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some synchronization issues in OSPF routing","authors":"A. Bouillard, C. Jard, Aurore Junier","doi":"10.5220/0004506800050014","DOIUrl":"https://doi.org/10.5220/0004506800050014","url":null,"abstract":"A routing protocol such as OSPF has a cyclic behavior to regularly update its view of the network topology. Its behavior is divided into periods. Each period produces a flood of network information messages. We observe a regular activity in terms of messages exchanges and filling of receive buffers in routers. This article examines the consequences of possible overlap of activity between periods, leading to a buffer overflow. OSPF allows “out of sync” flows by considering an initial delay (phase). We study the optimum calculation of these offsets to reduce the load, while maintaining a short period to ensure a protocol reactive to topology changes. Such studies are conducted using a simulated Petri net model. A heuristic for determining initial delays is proposed. A core network in Germany serves as illustration.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel technique for TCP based congestion control","authors":"M. Hrubý, M. Olsovsky, M. Kotocová","doi":"10.5220/0004504100360043","DOIUrl":"https://doi.org/10.5220/0004504100360043","url":null,"abstract":"Network performance increase does not have to be associated only with the upgrade of existing infrastructure and devices. More effective and less expensive increase of network performance can be achieved via sophisticated improvement of existing protocols, mainly at network and transport layer. The aim of this paper is to introduce our new approach for solving network performance issues which occur mostly due to congestion. New approach called Advanced Notification Congestion System (ACNS) allows TCP flows prioritization based on the TCP flow age and carried priority in the header of the network layer protocol. The main aim is to provide more bandwidth for young and high prioritized TCP flows by means of penalizing old greedy flows with a low priority. Using ACNS, substantial network performance increase can be achieved.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Bouras, Georgios Kioumourtzis, A. Gkamas, V. Kapoulas, D. Politaki, Enea Tsanai
{"title":"Evaluation of video transmission in emergency response ad hoc networks","authors":"C. Bouras, Georgios Kioumourtzis, A. Gkamas, V. Kapoulas, D. Politaki, Enea Tsanai","doi":"10.5220/0004496100270035","DOIUrl":"https://doi.org/10.5220/0004496100270035","url":null,"abstract":"Mobile Ad hoc NETworks (MANETs) are becoming more essential to wireless communications due to growing popularity of mobile devices. MANETs are also essential in Emergency Response situation where network information flow between deployed units is vital. In such cases voice and video transmission is essential to form a global view of the situation and decide on action. However, MANETs do not seem to effectively support multimedia applications and especially video transmission. In this work we evaluate the use of multiple interfaces and multiple channels for Video Transmission in Emergency Response Ad hoc Networks. We also evaluate the video transmission with rate adaptation. Aim of this paper is to tune multiinterfaces and multi-channels video transmission mechanisms in order to support better emerging situations and offer a solution to have acceptable transmission of the necessary video streams so that the control can get a complete overall picture of the situation and decide on the action to be taken. The simulation evaluation performed shows that multi-interfaces and multi-channels video transmission offers many advantages in Video Transmission in Emergency Response Ad hoc Networks.","PeriodicalId":430947,"journal":{"name":"2013 International Conference on Data Communication Networking (DCNET)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}