Search results for " protocol"

showing 10 items of 1320 documents

Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs

2007

This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronizertion among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link fai…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceInter-Access Point Protocolbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionNetwork allocation vectorWireless sensor networksIEEE 802.1QLogical link controlbusinessWireless sensor networkIEEE 802.15IEEE 802.11r-2008Computer networkIEEE 802.11s2007 16th International Conference on Computer Communications and Networks
researchProduct

Robust Data Gathering for Wireless Sensor Networks

2006

2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings Volume 1, 2005, Article number 1635527, Pages 469-474 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications; Kuala Lumpur; Malaysia; 16 November 2005 through 18 November 2005; Category number05EX1235; Code 69262 Robust data gathering for wireless sensor networks (Conference Paper) Ortolani, M. , Gatani, L. , Lo Re, G. Dipartimento di Ingegneria Informatica, Università degli Studi di Palermo, Viale delle Scienze Parco d'Orleans, 90128 Palermo, Italy View re…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDynamic Source RoutingStatic routingWi-Fi arrayNetwork packetVisual sensor networkWireless networkComputer scienceWireless ad hoc networkbusiness.industryRetransmissionRetransmissionDistributed computingWireless Routing ProtocolWireless WANGeographic routingKey distribution in wireless sensor networksLink-state routing protocolMobile wireless sensor networkRouting algorithmData gatheringbusinessWireless sensor networkWireless sensor networkComputer network2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic
researchProduct

PDA -- Remote Display Interaction Framework

2008

This paper discusses the design of a PDA-driven remote display control system which was designed for a pervasive computing scenario. Our solution enables a PDA to perform as an interaction device (such as keyboard or mouse) to operate applications which are using remote displays. Our system consists of two components: one devoted to pair users and remote display according to their relative position, and one to provide the PDA with appropriate graphical interfaces and ad-hoc communication protocols. Besides a case study on the use of remote displays during a course with in our department, this paper discusses system highlights, components, and experiments as for standard multimedia and offic…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteraction deviceUbiquitous computingComputer sciencebusiness.industryInteraction frameworkRemote displayComputer Science Artificial IntelligenceSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Human–computer interactionControl systemServerCommunications protocolbusinessGraphical user interface2008 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

2015

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteractive programmingSIMPLE (military communications protocol)MultimediaKnowledge representation and reasoningComputer Networks and CommunicationsComputer scienceDistributed computingcomputer.file_formatKnowledge Representationcomputer.software_genreFuzzy logiclcsh:TelecommunicationSoftware development processResource constrained devicesFuzzy LogicHigh-level programming languageMiddleware (distributed applications)Fuzzy Logic.lcsh:TK5101-6720ExecutableResource constrained devicecomputerHigh-level programmingEAI Endorsed Transactions on Cognitive Communications
researchProduct

A Middleware to Develop and Test Vehicular Sensor Network Applications

2019

The Smart city ecosystem is composed of several networked devices that provide services to citizens and improve their quality of life. Basic services, which must be exposed by the underlying software infrastructure, require efficient networking and communication protocols to coordinate and manage all the system components. In particular, Vehicular Sensor Networks (VSNs) are envisioned as key components of smart cities. Verification is crucial in such a highly dynamic scenario to ensure operation correctness and to reduce the development cost of smart applications. However, the rigidity of existing middlewares makes development, reconfiguration, and testing rather difficult. In this work, we…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIterative and incremental developmentSoftware VerificationCorrectnessComputer science020209 energyDistributed computing020208 electrical & electronic engineeringControl reconfiguration02 engineering and technologycomputer.file_formatcomputer.software_genreSmart CitieVehicular Sensor NetworkDistributed ApplicationSmart cityMiddleware (distributed applications)0202 electrical engineering electronic engineering information engineeringSymbolic processingSoftware Development and TestingExecutableCommunications protocolcomputerWireless sensor network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

A management architecture for active networks

2003

In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetwork packetbusiness.industryComputer sciencecomputer.internet_protocolDistributed computingTestbedSimple Network Management ProtocolNetwork topologyNetwork managementbusinessActive Networks Network ManagementcomputerNetwork management stationXMLActive networkingComputer networkProceedings of Fourth Annual International Workshop on Active Middleware Services
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct

Robust and Efficient Data Gathering for Wireless Sensor Networks

2006

This paper describes a new strategy for data gathering in wireless sensor networks that takes into account the need for both energy saving, typical of such networks, and for a reasonable tradeoff between robustness and efficiency. The proposed algorithm implements an efficient strategy for retransmission of lost packets by discovering alternative routes and making clever use of multiple paths when necessary; in order to do that we build upon the general framework presented in recent works, that provided a formulation of duplicate and order insensitive aggregation functions, and by taking advantage of some intrinsic characteristics of the wireless sensor networks, we exploit implicit acknowl…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRouting protocolbusiness.industryNetwork packetComputer sciencePacket transmissionDistributed computingRetransmissionWireless sensor networksBase stationKey distribution in wireless sensor networksIntelligent sensorRobustness (computer science)Aggregation functionbusinessWireless sensor networkComputer networkProceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct