Search results for " Telecom"

showing 10 items of 1269 documents

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

Recent advances of the multipactor RF breakdown in RF satellite microwave passive devices

2016

The main goal of this work is the review of the recent advances in the study of the multipactor RF breakdown phenomenon in RF satellite microwave passive devices for space telecommunication applications developed in the Val Space Consortium. In this work several topics related with the multipactor phenomenon will be discussed.

03 medical and health sciences0302 clinical medicineMaterials scienceNuclear magnetic resonance0202 electrical engineering electronic engineering information engineering020206 networking & telecommunicationsSatellite02 engineering and technologyRadio frequencyEngineering physics030217 neurology & neurosurgeryMicrowaveBreakdown phenomenon2016 Progress in Electromagnetic Research Symposium (PIERS)
researchProduct

On a Planar Dynamical System Arising in the Network Control Theory

2016

We study the structure of attractors in the two-dimensional dynamical system that appears in the network control theory. We provide description of the attracting set and follow changes this set suffers under the changes of positive parameters µ and Θ.

0301 basic medicineDynamical systems theoryPhase portraitattractor selection020206 networking & telecommunicationsphase portraits02 engineering and technologyDynamical systemnetworks controldynamical systemLinear dynamical system03 medical and health sciences030104 developmental biologyProjected dynamical systemControl theoryModeling and SimulationAttractor0202 electrical engineering electronic engineering information engineeringQA1-939Statistical physicsLimit setRandom dynamical systemAnalysisMathematicsMathematicsMathematical Modelling and Analysis
researchProduct

Discovering Differential Equations from Earth Observation Data

2020

Modeling and understanding the Earth system is a constant and challenging scientific endeavour. When a clear mechanistic model is unavailable, complex or uncertain, learning from data can be an alternative. While machine learning has provided excellent methods for detection and retrieval, understanding the governing equations of the system from observational data seems an elusive problem. In this paper we introduce sparse regression to uncover a set of governing equations in the form of a system of ordinary differential equations (ODEs). The presented method is used to explicitly describe variable relations by identifying the most expressive and simplest ODEs explaining data to model releva…

0301 basic medicineEarth observationTheoretical computer scienceComputer scienceDifferential equationOde020206 networking & telecommunications02 engineering and technologyData modeling03 medical and health sciences030104 developmental biologyOrdinary differential equation0202 electrical engineering electronic engineering information engineeringConstant (mathematics)Variable (mathematics)IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

Generalized Thru-Reflect-Line Calibration Technique for the Measurement of Multimodal Radiating Waveguides

2017

The objective of this letter is to extend the use of the generalized thru-reflect-line measurement technique to the case of a radiating multimodal rectangular waveguide aperture. Although this radiating aperture has been carefully studied from a theoretical point of view, the relevant experimental characterization has been limited to the case where the feeding waveguide is monomodal. In addition to theory, we also present experimental results that agree quite well with full-wave simulations, thereby fully validating the measurement technique.

0301 basic medicineEngineeringwaveguides open-endedbusiness.industryAperturePhysics::Optics020206 networking & telecommunications02 engineering and technologylaw.inventionGeneralized scattering matrix03 medical and health sciences030104 developmental biologyOpticslawLine (geometry)0202 electrical engineering electronic engineering information engineeringReflection (physics)CalibrationPoint (geometry)waveguide modesGeneralized scattering matrix; waveguide modes; waveguides open-ended; Electrical and Electronic EngineeringElectrical and Electronic EngineeringbusinessWaveguide
researchProduct

Arm Hypervisor and Trustzone Alternatives

2020

Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This ar…

0303 health sciences03 medical and health sciencesComputer science0202 electrical engineering electronic engineering information engineeringOperating system020206 networking & telecommunicationsHypervisor02 engineering and technologycomputer.software_genrecomputer030304 developmental biology
researchProduct

A Clustering approach for profiling LoRaWAN IoT devices

2019

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

050101 languages & linguisticsIoTComputer scienceIoT; LoRa; LoRaWAN; machine learning; k-means; anomaly detection; cluster analysisk-means02 engineering and technologyLoRaSilhouette0202 electrical engineering electronic engineering information engineeringProfiling (information science)Wireless0501 psychology and cognitive sciencesCluster analysisbusiness.industryNetwork packetSettore ING-INF/03 - Telecomunicazioni05 social sciencesk-means clusteringanomaly detectionLoRaWANmachine learning020201 artificial intelligence & image processingAnomaly detectionInternet of ThingsbusinessComputer networkcluster analysis
researchProduct