Search results for "Protocol"

showing 10 items of 1808 documents

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids

2022

Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…

Semi-supervised methods[SPI] Engineering Sciences [physics]Deep learningAnomaly detectionCyber-attack detectionProtocol IEC 104
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

M-commerce - mobile commerce: a new frontier for E-business

2005

Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…

Service (business)Electronic businessComputer sciencebusiness.industrycomputer.internet_protocolMobile commerceMobile computingServices computingMobile business developmentE-commerceBusiness modellaw.inventionWorld Wide WebBluetoothGSMlawMiddlewareInformation systemWireless Application ProtocolbusinesscomputerProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct

A SOA-based health service platform in smart home environment

2011

The increasing demand for a good healthcare quality has brought Information and Communication Technology to an important role in healthcare domain. The trend in decreasing number of formal healthcare workers gives further pressure to move non-urgent treatments to the patients' homes. However, delivering healthcare services to meet the changing needs of inhabitants in a smart home requires an open and flexible service creation and integration environment so that the modification of existing services as well as creation of new services can be achieved in a timely manner. This paper presents a vision of a logical integration platform in a smart home environment, integrating various devices and…

Service (business)Knowledge managementProcess managementbusiness.industryComputer sciencecomputer.internet_protocolmedia_common.quotation_subjectInteroperabilityIntegration platformInformation technologyService-oriented architectureHome automationInformation and Communications TechnologyQuality (business)businesscomputermedia_common2011 IEEE 13th International Conference on e-Health Networking, Applications and Services
researchProduct

A Community-based Approach for Service-based Application Composition in an Ecosystem

2010

The design of composite applications by combining existing services with known semantics is an ongoing topic in current research. Several studies are aimed at providing service description models and standards, service discovery and matching etc. However, service composition in distributed dynamic environments such as P2P ecosystems has received little attention from research communities. In this paper we present a design framework for composing services, taking in particular into account different ways of building peercommunities based on network or services characteristics.

Service (business)Matching (statistics)Computer sciencecomputer.internet_protocolbusiness.industryEnvironmental resource managementService discoveryOverlay networkService-oriented architectureSemanticsData scienceEcosystemService-based Application CompositionbusinesscomputerComposition (language)
researchProduct

Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos

2012

When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that appear similar in a networklevel may cause very different responses in an application level, and the other way round. In this article, we study how Windows Media Server's log files can be used to evaluate the QoS of video transmission, and we also examine the application level performance based…

Service (business)business.industryComputer sciencecomputer.internet_protocolQuality of serviceWindows MediaReal Time Streaming ProtocolNetwork interfaceMobile QoSService providerbusinesscomputerComputer network2012 18th IEEE International Conference on Networks (ICON)
researchProduct

MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios

2021

Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…

Service (systems architecture)Biomedical ResearchComputer scienceProcess (engineering)computer.internet_protocolHealth InformaticsReuse03 medical and health sciences0302 clinical medicineHealth Information ManagementComponent (UML)Humans030212 general & internal medicinePseudonymizationComputer SecurityLanguageAdvanced and Specialized NursingClass (computer programming)Application programming interfacebusiness.industry030220 oncology & carcinogenesisSoftware engineeringbusinesscomputerConfidentialitySoftwareXMLMethods of Information in Medicine
researchProduct