Search results for "Security"
showing 10 items of 1693 documents
Web Services Specific Security Standards
2014
Abstract In this paper are described the aspects regarding the security within OGSA framework, introducing WS-Security standard – OASIS standard for Web Services security. There are approached the security aspects of the OGSA environment for the delivered architectures P2P – ‘Peer-to-Peer’ and there are presented the recent initiatives for creating a specific and adapted environment OGSA for the applications P2P and the specific security demands of these transactions. Furthermore, there are exposed aspects regarding the mobility of services and resources in the P2P context, with the conditions of applying WSRF framework, derived from OGSA to the P2P environments, SOA processes in P2P enviro…
An Investigation of the Energy Consumption by Information Technology Equipments
2013
The World Wide Web and the rise of servers and PC's data centers have become a major position in the overall power consumption of the world. In order to prevent global warming and ensuing disasters, already Internet-service providers, hosting providers on green power have changed. Even household energy suppliers offer green electricity from renewable energy such as wind , solar, biomass and hydro, which emits no carbon dioxide, to stand against global warming. Only a global change for the information technology can prevent the global -warming. The switch to renewable energy is the beginning of our future and must be pursued as well as the research and development in information and communic…
Security Enhancement of Peer-to-Peer Session Initiation
2012
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…
Low-cost active cyber defence
2014
The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…
UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments
2010
A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…
New key based on tilted lenses for optical encryption
2016
A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Keynote talk 3: From basics to advanced modelling and simulation techniques for mobile radio channels
2011
From the earliest beginnings of mobile communications to the present time, there has always been a high demand for realistic mobile radio channel models. This demand is driven by the fact that channel models are indispensable for the performance evaluation, parameter optimisation, and test of mobile communication systems. Channel modelling and simulation techniques are therefore of great importance for electronics and telecommunication engineers who are involved in the development of present and future mobile communication systems. This presentation will start with a review of the basic principles of mobile radio channel modelling and gradually moves to more advanced modelling and simulatio…
A new autonomous data transmission reduction method for wireless sensors networks
2018
International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…
MEDiSN
2008
Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high-quality care. Moreover, there is a growing concern about the ability of hospitals to provide effective care during disaster events. Tools that automate patient monitoring would greatly improve efficiency, quality of care, and the volume of patients treated. Towards this goal, we have developed MEDiSN, a wireless sensor network for monitoring patients' vital signs in hospitals and disaster events. MEDiSN consists of Patient Monitors which are custom-built, patient-worn motes that sample, compress and secure medical data, and Relay Points that form a static multi-hop wireles…