Change search
Refine search result
1 - 19 of 19
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Atif, Yacine
    et al.
    UAE University, United Arab Emirates.
    Zhang, Liren
    UAE University, Univted Arab Emirates.
    Network Resource Management in Support of QoS in Ubiquitous Learning2014In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 41, p. 148-156Article in journal (Refereed)
    Abstract [en]

    Ubiquitous learning involves a large-scale service network organized as a social infrastructure. These environments weave together context service dissemination, learner profiling as well as autonomic control of the induced network traffic. The objective of the research presented in this paper is to derive a Quality of Service aware model of ubiquitous learning services based on typical learning schemes. These pedagogical patterns are designed to match various learning situations in terms of learning context, learner profile and network infrastructure. They particularly represent classes of services in ubiquitous learning environments to prioritize traffic so that less important traffic does not consume network bandwidth and slow down or halt the delivery of more important traffic. We analyze formally and empirically the network traffic requirements of a proposed learning service quality controller to support providers of learning services allocating resources in a pervasive learning environment.

  • 2.
    Baqer Mollah, Muhammad
    et al.
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Kalam Azad, Md. Abul
    Department of Computer Science and Engineering, Jahangirnagar University, Dhaka.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Security and privacy challenges in mobile cloud computing: Survey and way ahead2017In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 84, p. 38-54Article in journal (Refereed)
    Abstract [en]

    The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.

  • 3.
    Corredor, Iván
    et al.
    Technical University of Madrid.
    Martínez-Ortega, José-Fernán
    Technical University of Madrid.
    Familiar, Miguel S
    Technical University of Madrid.
    Lopez, Lourdes
    Technical University of Madrid.
    Knowledge-aware and service-oriented middleware for deploying pervasive services2012In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 35, no 2, p. 562-576Article in journal (Refereed)
    Abstract [en]

    Many applications and services have emerged in the frame of new Internet of Things paradigm. This novel view has opened the Web services to a variety of devices especially to tiny and resource-constrained devices. Wireless Sensor and Actuator Networks belong to that kind of devices. Those networks have become one of the more promising technologies to take part in the Future Internet. However, the integration of Sensor and Actuator Networks into the Service Cloud is a hard challenge requiring specific new architectures and protocols. This paper presents a middleware approach addressing this important issue. A Knowledge-Aware and Service-Oriented Middleware (KASOM) for pervasive embedded networks is proposed. The major aim of KASOM is to offer advanced and enriched pervasive services to everyone connected to Internet. In this sense, KASOM implements mechanisms and protocols which allow managing the knowledge generated in pervasive embedded networks in order to expose it to Internet users in a readable way. General functional requirements of embedded sensor and actuator platforms have been taken into account when designing KASOM, with special attention in energy consumption, memory and bandwidth. The KASOM evaluation and validation will be demonstrated through a real Wireless Sensor and Actuator Network deployment based on integral healthcare services in a sanatorium.

  • 4.
    Lin, Chao
    et al.
    Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University.
    He, Debiao
    Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University.
    Huang, Xinyi
    School of Mathematics and Computer Science, Fujian Normal University.
    Choo, Kim-Kwang Raymond
    The University of Texas at San Antonio.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.02018In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 116, p. 42-52Article in journal (Refereed)
    Abstract [en]

    To be prepared for the ‘Industry 4.0’-era, we propose a hierarchical framework comprising four tangible layers, which is designed to vertically integrate inter-organizational value networks, engineering value chain, manufacturing factories, etc. The conceptual framework allows us to efficiently implement a flexible and reconfigurable smart factory. However, we need to consider security inherent in existing (stand-alone) devices and networks as well as those that may arise in such integrations. Especially the existing solutions are insufficient to address these fundamental security concerns. Thus, we present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. The proposed system (with integrated attribute signature, multi-receivers encryption and message authentication code) is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality. BSeIn also scales well due to the utilization of smart contract. We then evaluate the security and performance of BSeIn. For example, findings from the performance evaluation demonstrate that Initialization/Request Issuance/Chain Transaction/State Delivery/Permission Update phase only cost 12.123/4.810/6.978/0.013/2.559s, respectively.

  • 5.
    Marotta, Antonio
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Zola, Enrica
    Universitat Politècnica de Catalunya, Barcelona, Spain.
    D'Andreagiovanni, Fabio
    Sorbonne Universités, Université de Technologie de Compiègne, France.
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    A fast robust optimization-based heuristic for the deployment of green virtual network functions2017In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 95, p. 45-53Article in journal (Refereed)
    Abstract [en]

    Network Function Virtualization (NFV) has attracted a lot of attention in the telecommunication field because it allows to virtualize core-business network functions on top of a NFV Infrastructure. Typically, virtual network functions (VNFs) can be represented as chains of Virtual Machines (VMs) or containers that exchange network traffic which are deployed inside datacenters on commodity hardware. In order to achieve cost efficiency, network operators aim at minimizing the power consumption of their NFV infrastructure. This can be achieved by using the minimum set of physical servers and networking equipment that are able to provide the quality of service required by the virtual functions in terms of computing, memory, disk and network related parameters. However, it is very difficult to predict precisely the resource demands required by the VNFs to execute their tasks. In this work, we apply the theory of robust optimization to deal with such parameter uncertainty. We model the problem of robust VNF placement and network embedding under resource demand uncertainty and network latency constraints using robust mixed integer optimization techniques. For online optimization, we develop fast solution heuristics. By using the virtualized Evolved Packet Core as use case, we perform a comprehensive evaluation in terms of performance, solution time and complexity and show that our heuristic can calculate robust solutions for large instances under one second.

  • 6.
    Modarres Razavi, Sara
    et al.
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, The Institute of Technology.
    Yuan, Di
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering. Ericsson AB, Sweden.
    Gunnarsson, Fredrik
    Ericsson AB, Sweden.
    Moe, Johan
    Ericsson AB, Sweden.
    On dynamic signaling congestion mitigation by overlapping tracking area lists2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 53, p. 164-172Article in journal (Refereed)
    Abstract [en]

    Mitigating signaling congestion of tracing user equipments (UEs), adaptively to the changes in UE location and mobility patterns is a challenging issue in mobility management of Long Term Evolution (LTE) networks. Signaling congestion usually occurs due to many UEs behaving in a similar manner, e.g., massive and simultaneous UE mobility in a train movement scenario. LTE networks allow the use of tracking area lists (TALs), each being a list containing multiple tracking areas (TAs). The overlapping TAL scheme has been previously used for signaling congestion mitigation for snapshot scenarios. For maintaining the improved performance over non-list-oriented TA configuration over time, an automatic dynamic configuration framework, which is a key aspect in Self-Organizing Network (SON), has been applied in this paper. We develop a linear programming model for optimal TAL configuration. Repetitively solving the model for different time intervals gives an evaluation framework on the performance of SON location management. Comprehensive numerical results are presented in this study using a large-scale realistic network scenario. The experiments demonstrate the effectiveness of the SON dynamic framework in reducing the total signaling overhead of the network compared to the static TA. Moreover, the overlapping TAL scheme significantly improves the performance of the network in the tracking area update congested scenarios over the conventional TA configuration.

  • 7.
    Mohd, Bassam Jamil
    et al.
    Computer Engineering Department, Hashemite University.
    Hayajneh, Thaier
    School of Engineering and Computing Sciences, New York Institute of Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 58, p. 73-93Article in journal (Refereed)
    Abstract [en]

    This paper investigates the lightweight block ciphers' implementations, which have received a fair amount of research for their essential security role in low-resource devices. Our objective is to present a comprehensive review of state-of-the-art research progress in lightweight block ciphers' implementation and highlight future research directions. At first, we present taxonomy of the cipher design space and accurately define the scope of lightweight ciphers for low-resource devices. Moreover, this paper discusses the performance metrics that are commonly reported in the literature when comparing cipher implementations. The sources of inaccuracies and deviations are carefully examined. In order to mitigate the confusion in the composite metrics, we developed a general metric which includes the basic metrics. Our analysis designated the energy/bit metric as the most appropriate metric for energy-constrained low-resource designs. Afterwards, the software and hardware implementations of the block cipher algorithms are surveyed, investigated, and compared. The paper selects the top performing ciphers in various metrics and suggests the Present cipher as a good reference for hardware implementations. What transpires from this survey is that unresolved research questions and issues are yet to be addressed by future research projects.

  • 8.
    Mohideen, Althaff C.
    et al.
    University of Aberdeen, UK.
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Secchi, Raffaello
    University of Aberdeen, UK.
    Fairhurst, Gorry
    University of Aberdeen, UK.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Weinrank, Felix
    Münster University of Applied Sciences, Germany.
    Evaluating the impact of transport mechanisms on web performance for effective web access2019In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 137, p. 25-34Article in journal (Refereed)
    Abstract [en]

    This paper explores the design trade-offs required for an Internet transport protocol to effectively support web access. It identifies a set of distinct transport mechanisms and explores their use with a focus on multistreaming. The mechanisms are studied using a practical methodology that utilise the range of transport features provided by TCP and SCTP. The results demonstrate the relative benefit of key transport mechanisms and analyse how these impact web access performance. Our conclusions help identify the root causes of performance impairments and suggest appropriate choices guiding the design of a web transport protocol. Performing this analysis at the level of component transport mechanisms enables the results to be utilised in the design of new transport protocols, such as IETF QUIC.

  • 9.
    Pau, Giovanni
    et al.
    Kore Univ Enna, Enna, Italy..
    Bazzi, Alessandro
    CNR, Rome, Italy..
    Campista, Miguel Elias M.
    Univ Fed Rio de Janeiro, Rio De Janeiro, Brazil..
    Balador, Ali
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Towards 5G and beyond for the internet of UAVs, vehicles, smartphones, Sensors and Smart Objects2019In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 135, p. 108-109Article in journal (Other academic)
  • 10.
    Sajid Mushtaq, M.
    et al.
    University of Paris Est Creteil VdM UPEC, France.
    Fowler, Scott
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, The Institute of Technology.
    Mellouk, Abdelhamid
    University of Paris Est Creteil VdM UPEC, France.
    Augustin, Brice
    University of Paris Est Creteil VdM UPEC, France.
    QoE/QoS-aware LTE downlink scheduler for VoIP with power saving2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 51, p. 29-46Article in journal (Refereed)
    Abstract [en]

    The emerging and fastest growing multimedia services such as Skype, GTalk and interactive video gaming have created new challenges for wireless communication technologies, especially in terms of resource allocation and power optimization of User Equipments (UEs). The efficient resources and the power optimization are very important in the next communication systems because new multimedia services are more resource and power hungry. Having more traffic flow in the downlink as compared to the uplink, the resource allocation schemes in the downlink are more important than those in the uplink. In this paper, we have proposed a new downlink scheduling scheme, known as Quality-aware DRX (Q-DRX) Scheme, for Long Term Evaluation (LTE) wireless networks that not only improves the Quality of Service (QoS) to satisfy the users experience of multimedia services but also saves the UEs power by using the Discontinuous Reception (DRX). This paper investigates how the different durations of DRX Light and Deep Sleep cycles affect the QoS and influence the Quality of Experience (QoE) of end users, in the context of Voice over IP (VoIP) traffic delivery over the LTE wireless network. The performance of the Q-DRX scheme is evaluated with traditional scheduling schemes, in the perception of the following important parameters, System Throughput, Throughput Fairness Index, Packet Loss Rate and Packet Delay. Our proposed Q-DRX Scheme successfully minimized the packets delay and packets loss by considering the key parameters of QoS with fair resources distribution among the UEs to achieve a high satisfaction level. (C) 2014 Elsevier Ltd. All rights reserved.

  • 11. Ta, Duong Nguyen Binh
    et al.
    Zhou, Suiping
    Cai, Wentong
    Tang, Xueyan
    Ayani, Rassul
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Software and Computer Systems, SCS.
    Multi-objective zone mapping in large-scale distributed virtual environments2011In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 34, no 2, p. 551-561Article in journal (Refereed)
    Abstract [en]

    In large-scale distributed virtual environments (DVEs), the NP-hard zone mapping problem concerns how to assign distinct zones of the virtual world to a number of distributed servers to improve overall interactivity. Previously, this problem has been formulated as a single-objective optimization problem, in which the objective is to minimize the total number of clients that are without QoS. This approach may cause considerable network traffic and processing overhead, as a large number of zones may need to be migrated across servers. In this paper, we introduce a multi-objective approach to the zone mapping problem, in which both the total number of clients without QoS and the migration overhead are considered. To this end, we have proposed several new algorithms based on meta-heuristics such as local search and multi-objective evolutionary optimization techniques. Extensive simulation studies have been conducted with realistic network latency data modeled after actual Internet measurements, and different workload distribution settings. Simulation results demonstrate the effectiveness of the newly proposed algorithms.

  • 12.
    Tsiftes, Nicolas
    et al.
    RISE SICS, Box 1263, SE-16429 Kista, Sweden.
    Voigt, Thiemo
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication. RISE SICS, Box 1263, SE-16429 Kista, Sweden.
    Velox VM: A safe execution environment for resource-constrained IoT applications2018In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 118, p. 61-73Article in journal (Refereed)
    Abstract [en]

    We present Velox, a virtual machine architecture that provides a safe execution environment for applications in resource-constrained IoT devices. Our goal with this architecture is to support developers in writing and deploying safe IoT applications, in a manner similar to smartphones with application stores. To this end, we provide a resource and security policy framework that enables fine-grained control of the execution environment of IoT applications. This framework allows device owners to configure, e.g., the amount of bandwidth, energy, and memory that each IoT application can use. Velox's features also include support for high-level programming languages, a compact bytecode format, and preemptive multi-threading. In the context of IoT devices, there are typically severe energy, memory, and processing constraints that make the design and implementation of a virtual machine with such features challenging. We elaborate on how Velox is implemented in a resource-efficient manner, and describe our port of Velox to the Contiki OS. Our experimental evaluation shows that we can control the resource usage of applications with a low overhead. We further show that, for typical I/O-driven IoT applications, the CPU and energy overhead of executing Velox bytecode is as low as 1-5% compared to corresponding applications compiled to machine code. Lastly, we demonstrate how application policies can be used to mitigate the possibility of exploiting vulnerable applications.

  • 13.
    Tsiftes, Nicolas
    et al.
    RISE SICS.
    Voigt, Thiemo
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Velox VM: A safe execution environment for resource-constrained IoT applications2018In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 18, p. 61-73Article in journal (Refereed)
    Abstract [en]

    We present Velox, a virtual machine architecture that provides a safe execution environment for applications in resource-constrained IoT devices. Our goal with this architecture is to support developers in writing and deploying safe IoT applications, in a manner similar to smartphones with application stores. To this end, we provide a resource and security policy framework that enables fine-grained control of the execution environment of IoT applications. This framework allows device owners to configure, e.g., the amount of bandwidth, energy, and memory that each IoT application can use. Velox's features also include support for high-level programming languages, a compact bytecode format, and preemptive multi-threading.

    In the context of IoT devices, there are typically severe energy, memory, and processing constraints that make the design and implementation of a virtual machine with such features challenging. We elaborate on how Velox is implemented in a resource-efficient manner, and describe our port of Velox to the Contiki OS. Our experimental evaluation shows that we can control the resource usage of applications with a low overhead. We further show that, for typical I/O-driven IoT applications, the CPU and energy overhead of executing Velox bytecode is as low as 1–5% compared to corresponding applications compiled to machine code. Lastly, we demonstrate how application policies can be used to mitigate the possibility of exploiting vulnerable applications.

  • 14.
    Tsiftes, Nicolas
    et al.
    RISE - Research Institutes of Sweden, ICT, SICS.
    Voigt, Thiemo
    RISE - Research Institutes of Sweden, ICT, SICS. Uppsala University, Sweden.
    Velox VM: A safe execution environment for resource-constrained IoT applications2018In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 118, p. 61-73Article in journal (Refereed)
    Abstract [en]

    We present Velox, a virtual machine architecture that provides a safe execution environment for applications in resource-constrained IoT devices. Our goal with this architecture is to support developers in writing and deploying safe IoT applications, in a manner similar to smartphones with application stores. To this end, we provide a resource and security policy framework that enables fine-grained control of the execution environment of IoT applications. This framework allows device owners to configure, e.g., the amount of bandwidth, energy, and memory that each IoT application can use. Velox's features also include support for high-level programming languages, a compact bytecode format, and preemptive multi-threading.

    In the context of IoT devices, there are typically severe energy, memory, and processing constraints that make the design and implementation of a virtual machine with such features challenging. We elaborate on how Velox is implemented in a resource-efficient manner, and describe our port of Velox to the Contiki OS. Our experimental evaluation shows that we can control the resource usage of applications with a low overhead. We further show that, for typical I/O-driven IoT applications, the CPU and energy overhead of executing Velox bytecode is as low as 1–5% compared to corresponding applications compiled to machine code. Lastly, we demonstrate how application policies can be used to mitigate the possibility of exploiting vulnerable applications.

  • 15.
    Tuna, Gurkan
    et al.
    Trakya University, Edime, Turkey.
    Nefzi, Bilel
    Independent Research, Paris, France.
    Conte, Gianpaolo
    Linköping University, Department of Computer and Information Science, Artificial Intelligence and Integrated Computer Systems. Linköping University, The Institute of Technology.
    Unmanned aerial vehicle-aided communications system for disaster recovery2014In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 41, p. 27-36Article in journal (Refereed)
    Abstract [en]

    After natural disasters such as earthquakes, floods, hurricanes, tornados and fires, providing emergency management schemes which mainly rely on communications systems is essential for rescue operations. To establish an emergency communications system during unforeseen events such as natural disasters, we propose the use of a team of unmanned aerial vehicles (UAVs). The proposed system is a post-disaster solution and can be used whenever and wherever required. Each UAV in the team has an onboard computer which runs three main subsystems responsible for end-to-end communication, formation control and autonomous navigation. The onboard computer and the low-level controller of the UAV cooperate to accomplish the objective of providing local communications infrastructure. In this study, the subsystems running on each UAV are explained and evaluated by simulation studies and field tests using an autonomous helicopter. While the simulation studies address the efficiency of the end-to-end communication subsystem, the field tests evaluate the accuracy of the navigation subsystem. The results of the field tests and the simulation studies show that the proposed system can be successfully used in case of disasters to establish an emergency communications system.

  • 16.
    Varga, Pal
    et al.
    Budapest University of Technology and Economics.
    Blomstedt, Fredrik
    BNearIT Inc., Lulea.
    Ferreira, Luis Lino
    ISEP, Polytechnic of Porto – School of Engineering.
    Eliasson, Jens
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Johansson, Mats
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Delsing, Jerker
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.
    Martínez de Soria, Iker
    Tecnalia Research and Innovation, Bilbao.
    Making system of systems interoperable: The core components of the arrowhead framework2017In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 81, p. 85-95Article in journal (Refereed)
    Abstract [en]

    The objective of the Arrowhead Framework is to efficiently support the development, deployment and operation of interconnected, cooperative systems. It is based on the Service Oriented Architecture philosophy. The building elements of the framework are systems that provide and consume services, and cooperate as systems of systems. Some commonly used systems, such as orchestration, authorization or service registry are considered as core. These can be used by any system of systems that follow the guidelines of the Arrowhead Framework.

    Within the framework, systems – using different information exchange technologies during collaboration – are helped through various approaches. These include the so-called Interoperability Layer, as well as systems and services for translation. Furthermore, one of the main problems of developing such highly interoperable systems is the lack of understanding between various development groups. Adequate development and service documentation methodologies can help to overcome this issue.

    The design, development and verification methodology for each service, system and system of systems within the Arrowhead Framework supports that these can be implemented, verified, deployed, and run in an interoperable way. This paper presents an overview of the framework together with its core elements – and provides guidelines for the design and deployment of interoperable, Arrowhead-compliant cooperative systems.

  • 17.
    Vasilakos, Athanasios
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Li, Zhe
    Institut Mine Telecom - Telecom Bretagne, France.
    Simon, Gwendal
    Institut Mine Telecom - Telecom Bretagne, France.
    You, Wei
    Orange, France.
    Information centric network: Research challenges and opportunities2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 52, p. 1-10Article in journal (Refereed)
    Abstract [en]

    For more than a decade, the inherent drawbacks of current Internet have been calling for its revolutionary designs. The end-to-end model, which was designed for special data transmission in the early age of Internet, is causing troubles everywhere in nowadays content based web services. Consequently, Information Centric Network (ICN) is proposed to solve these problems. As the most permanent clean-slate approach for next generation Internet, ICN has attracted much attention from network researchers in the passed few years. This survey focuses on the current progress of the research work in ICN. It investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this domain.

  • 18.
    Wazid, Mohammad
    et al.
    Cyber Security and Networks Lab, Innopolis University, Innopolis, Russia.
    Kumar Das, Ashok
    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Authenticated key management protocol for cloud-assisted body area sensor networks2018In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 123, p. 112-126Article in journal (Refereed)
    Abstract [en]

    Due to recent advances in various technologies such as integrated circuit, embedded systems and wireless communications, the wireless body area network (WBAN) becomes a propitious networking paradigm. WBANs play a very important role in modern medical systems as the real-time biomedical data through intelligent medical sensors in or around the patients' body can be collected and sent the data to remote medical personnel for clinical diagnostics. However, wireless nature of communication makes an adversary to intercept or modify the private and secret data collected by the sensors in WBANs. In critical applications of WBANs, there is a great requirement to access directly the sensing information collected by the body sensors by an external user (e.g., a doctor) in order to monitor the health condition of a patient. In order to do so, the user needs to first authenticate with the accessed body sensors, and only after mutual authentication between that user and the body sensors the real-time data can be directly accessed securely by the user.

    In this paper, we propose a new user authentication and key management scheme for this purpose. The proposed scheme allows mutual authentication between a user and personal server connected to WBAN via the healthcare server situated at the cloud, and once the mutual authentication is successful, both user and personal server are able to establish a secret session key for their future communication. In addition, key management process is provided for establishment of secret keys among the sensors and personal server for their secure communication. The formal security based on broadly-accepted Real-Or-Random (ROR) model and informal security give confidence that the proposed scheme can withstand several known attacks needed for WBAN security. A detailed comparative analysis among the proposed scheme and other schemes shows that the proposed scheme provides better security & functionality features, low computation and comparable communication costs as compared to recently proposed related schemes. Finally, the practical demonstration using the NS2 based simulation is shown for the proposed scheme and also for other schemes.

  • 19.
    Yang, Ting
    et al.
    China, Australia.
    Sun, Yugeng
    China.
    Taheri, Javid
    The University of Sydney, Australia.
    Zomaya, Albert
    The University of Sydney, Sydney, Australia.
    DLS: A Dynamic Local Stitching Mechanism to Rectify Transmitting Path Fragments in Wireless Sensor Networks2013In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 16, no 1, p. 306-315Article in journal (Refereed)
    Abstract [en]

    In this paper, a pair of novel rectification algorithms (greedy negative pressure push algorithm and dynamic local stitching algorithm) is proposed to cooperatively repair broken transmitting paths in Wireless Sensor Networks. Our approach is to overcome the poor data validity in WSNs, specifically for harsh application environments - such as unattended sensor nodes or frail wireless transmitting channels - where fault tolerant becomes a vital aspect. Using adjacency information, Greedy negative pressure push algorithm can efficiently grow the transmitting path to achieve the minimum energy consumption for relays model. Here, we measured packet travel time and the expectation of relay distance to set this model's key parameters to achieve the lowest possible end-to-end transmitting delay. Dynamic local stitching algorithm has a major difference with other existing routing algorithms in rectifying broken paths: despite others that reroute whole paths, our algorithms only stitch broken fragments of the original path spending minimum amount of energy as well as recovery time. Based on mathematical computing and simulation, our novel rectification algorithm could effectively (1) reduce the total number of routing overheads, (2) improve net throughput, and (3) increase system fault tolerant much better than four already designed routing algorithms. Results were also very promising to motivate other algorithms in this field.

1 - 19 of 19
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf