Search results for " protocol"
showing 10 items of 1320 documents
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
Privacy Enhanced Device Access
2012
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
M-commerce - mobile commerce: a new frontier for E-business
2005
Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…
Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos
2012
When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that appear similar in a networklevel may cause very different responses in an application level, and the other way round. In this article, we study how Windows Media Server's log files can be used to evaluate the QoS of video transmission, and we also examine the application level performance based…
Second Opinion System for Intraoral Lesions
2014
In this paper we present the prototype of a teledentistry system to perform the remote diagnosis of oral diseases. It makes use of a particular device called intra-oral (or dental) camera properly designed to shoot video and take pictures of the inner part of the mouth. The intra-oral cameras can be connected via USB to a common PC and they are very cheap, unlike the intra-oral photography kit for DSLR cameras. Usually this kind of devices are used in dentistry studies for local visualization by means of specialized software. The novelty of our system is that the real-time video produced by this device is canalized into a video streming by means of Video LAN client server (VLC) and pictures…
IN service specification using the KANNEL language
1995
KANNEL is an application-oriented language for protocol engineering, with integrated support for all the main aspects of implementing typical communications software. Intelligent network services with distributed and interacting components share a number of central features with communications protocols, thus bringing in the possibility of applying protocol engineering techniques within the area of intelligent networking. To verify this view, the KANNEL language is applied to the specification of an intelligent calling card service. The specification includes both visual and textual notations of KANNEL.
Interaction Mechanism of Humans in a Cyber-Physical Environment
2015
The research initiative “Industrie 4.0” (I4.0) of the high-tech strategy announced by the German government targets the deployment of a cyber-physical system (CPS) in production and logistics. Such CPS-based environments are characterized by an increasing number of heterogeneous intelligent autonomous and communicating artifacts tightly integrated with humans. Thus, the human’s role will become a composite factor (“man-in-the-mesh”) for this future CPS environment, playing more than just a simple role inside the control loop. This paper investigates the need of a robust communication between CPS and humans, which includes a clear semantic of the exchanged information. For this purpose, a me…
An Integrated Multi-service Software Simulation Platform: SIMPSONS Architecture
2005
This paper describes SIMPSONS (SIp and MPls Simulations On NS-2), which is a software platform for simulating multiple network scenarios, such as Telephony Over IP (TOIP), and multi-services networks extending the functionalities of Network Simulator NS-2. The innovative aspects of SIMPSONS is the complete integration of control protocols and traffic engineering mechanisms inside the same simulation tool. In fact, next generation networks must meet basically two fundamental requirements: support of Quality of Service (QoS) and Traffic Engineering (TE) functionalities. SIMPSONS is able to simulate DiffServ, MPLS, OSPF and SIP and their interaction in everything TOIP scenario. So with this po…
Improvement of a Service Level Negotiation Protocol using Formal Verification
2013
International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…