Search results for "Computer network"

showing 10 items of 1634 documents

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

Channel Occupancy-Based Dynamic Spectrum Leasing in Multichannel CRNs: Strategies and Performance Evaluation

2016

Spectrum leasing has been proposed as an effective approach for enabling more flexible spectrum utilization in CRNs. In CRNs, a primary network (PN) which consists of multiple primary users (PUs) can lease part of the licensed spectrum to secondary users (SUs) in exchange for operational benefits. The focus of this study is to investigate how and to what extent the PN allows spectrum leasing in CRNs, considering the QoS requirements of the PN and the secondary network (SN). Correspondingly, we propose two dynamic spectrum leasing strategies, which can improve the QoS performance of SUs while ensuring sufficient remuneration for PUs. In order to dynamically adjust the portion of leased bandw…

business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputerApplications_COMPUTERSINOTHERSYSTEMS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyBlocking (statistics)Cognitive radioDigital subscriber line0203 mechanical engineeringDynamic pricing0202 electrical engineering electronic engineering information engineeringResource allocationNetwork performanceElectrical and Electronic EngineeringbusinessSimulationComputer networkIEEE Transactions on Communications
researchProduct

Temporal Fairness Provisioning in Multi-Rate Contention-Based 802.11e WLANs

2005

The IEEE 802.11e extensions for QoS support in WLAN define the transmission opportunity (TXOP) concept, in order to limit the channel holding times of the contending stations in the presence of delay-sensitive traffic. We evaluate the use of TXOP for a different purpose: "temporal fairness" provisioning among stations employing different data rates. We show that the equalization of the channel access times allows each station to obtain its throughput basically (1) proportional to its transmission rate, and (2) independent of the transmitted frame length. This also improves the aggregate throughput of the overall WLAN. For a given TXOP limit, i.e., a granted channel access time, a station is…

business.industryComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingFrame (networking)ComputingMilieux_PERSONALCOMPUTINGWireless local area networks (WLAN)ProvisioningThroughputThroughputIEEE 802.11e-2005Limit (mathematics)businessadaptation schemeAccess timeCommunication channelComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct

A new inter-cloud service-level guarantee protocol applied to space missions

2017

Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground control points around the world to reduce the cost. An inter-cloud communication protocol with a guarantee of the service level will significantly reduce the cost if each ground control segment is considered as a cloud provider. This paper outlines a new protocol that was developed to take into consideration the end-to-end service-level guarantee. Th…

business.industryComputer scienceQuality of serviceDistributed computingApplied MathematicsCloud computing02 engineering and technology01 natural sciencesComputer Science ApplicationsManagement Information SystemsService-level agreement020204 information systemsService level0103 physical sciencesScalability0202 electrical engineering electronic engineering information engineeringSpace industrybusinessCommunications protocol010303 astronomy & astrophysicsProtocol (object-oriented programming)Computer networkInternational Journal of Grid and Utility Computing
researchProduct

Evaluating the user experience of omnidirectional VR walking simulators

2020

Abstract Omnidirectional treadmills (ODTs) have been traditionally proposed as a promising solution for users’ navigation in large-scale virtual environments. These mechanical devices enable users to perform locomotive motion with 360-deg freedom, while keeping their position fixed in the physical world. However, most locomotion approaches based on omnidirectional treadmills have presented either high acquisition or maintenance costs, being the capabilities of the general public, or a limited reliability. In this paper, we present a comparative usability and acceptance study with real users evaluating the two most common approaches for the development of this type of Virtual Reality (VR) wa…

business.industryComputer scienceReliability (computer networking)05 social sciences020207 software engineeringUsability02 engineering and technologyVirtual realityMotion (physics)Human-Computer InteractionUser experience designHuman–computer interactionCorrelation analysis0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesTreadmillbusinessOmnidirectional antenna050107 human factorsSoftwareEntertainment Computing
researchProduct

Energy consumption and optimal relay node placement for cooperative retransmissions

2010

Previous work on cooperative MAC design has shown significant performance improvement in terms of throughput and packet delivery ratio. However, little attention has been paid to extra energy cost at the relay node in order to achieve such benefit. In this paper, we focus on analyzing energy consumption at a relay node in cooperative retransmission networks with mixed Rayleigh and Rician fading channels. Furthermore, optimal relay location is studied with respect to energy efficiency in different scenarios. The simulation and calculation results coincide with each other, both showing the optimal location of the relay node is scenario-dependent and can be obtained under given channel conditi…

business.industryComputer scienceRetransmissionNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYEnergy consumptionlaw.inventionComputer Science::PerformanceRelaylawRician fadingComputer Science::Networking and Internet ArchitecturebusinessRelay channelComputer Science::Information TheoryEfficient energy useComputer network2010 7th International Symposium on Wireless Communication Systems
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

Analysis of the Effect of Human Presence on a Wireless Sensor Network

2011

Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniRSSReal-time computingcomputer.file_formatRadio propagationKey distribution in wireless sensor networksBuilt Environment Networks (BENs) Human Presence Node Placement Radiation Patterns Wireless Sensor Networks (WSNs)Ray tracing (graphics)Radio frequencyTransceiverbusinessWireless sensor networkcomputerDimensioningSoftwareComputer network
researchProduct

An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…

business.industryComputer scienceTransmission Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningScalable TCPVDP::Technology: 500::Information and communication technology: 550ThroughputH-TCPNetwork congestionComputer Science::Networking and Internet ArchitectureCommunications satellitebusinessBIC TCPComputer network2009 7th International Conference on Information, Communications and Signal Processing (ICICS)
researchProduct