Search results for "Protocol"
showing 10 items of 1808 documents
A Geographical Self-Organizing Approach for Vehicular Networks
2012
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
2022
Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…
Privacy Enhanced Device Access
2012
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
M-commerce - mobile commerce: a new frontier for E-business
2005
Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…
A SOA-based health service platform in smart home environment
2011
The increasing demand for a good healthcare quality has brought Information and Communication Technology to an important role in healthcare domain. The trend in decreasing number of formal healthcare workers gives further pressure to move non-urgent treatments to the patients' homes. However, delivering healthcare services to meet the changing needs of inhabitants in a smart home requires an open and flexible service creation and integration environment so that the modification of existing services as well as creation of new services can be achieved in a timely manner. This paper presents a vision of a logical integration platform in a smart home environment, integrating various devices and…
A Community-based Approach for Service-based Application Composition in an Ecosystem
2010
The design of composite applications by combining existing services with known semantics is an ongoing topic in current research. Several studies are aimed at providing service description models and standards, service discovery and matching etc. However, service composition in distributed dynamic environments such as P2P ecosystems has received little attention from research communities. In this paper we present a design framework for composing services, taking in particular into account different ways of building peercommunities based on network or services characteristics.
Using WMS log files as an indicator of QoS and application performance in on-demand streaming videos
2012
When utilizing video streaming for professional purposes, the quality of service needs to be evaluated by the service provider. This is the case especially when the service must be available for a large number of customers with a wide range of network interfaces and terminal equipment. Service providers have usually information about network-level metrics. However, the problem is that conditions that appear similar in a networklevel may cause very different responses in an application level, and the other way round. In this article, we study how Windows Media Server's log files can be used to evaluate the QoS of video transmission, and we also examine the application level performance based…
MAGICPL: A Generic Process Description Language for Distributed Pseudonymization Scenarios
2021
Abstract Objectives Pseudonymization is an important aspect of projects dealing with sensitive patient data. Most projects build their own specialized, hard-coded, solutions. However, these overlap in many aspects of their functionality. As any re-implementation binds resources, we would like to propose a solution that facilitates and encourages the reuse of existing components. Methods We analyzed already-established data protection concepts to gain an insight into their common features and the ways in which their components were linked together. We found that we could represent these pseudonymization processes with a simple descriptive language, which we have called MAGICPL, plus a relati…