Search results for "Stateful firewall"

showing 5 items of 5 documents

A fast heuristic for solving the D1EC coloring problem

2010

In this paper we propose an efficient heuristic for solving the Distance-1 Edge Coloring problem (D1EC) for the on-the-fly assignment of orthogonal wireless channels in wireless as soon as a topology change occurs. The coloring algorithm exploits the simulated annealing paradigm, i.e., a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a sub optimal coloring scheme even for the case of dynamic channel allocation. However, a stateful implementation of the D1EC scheme is needed in order to speed-up the network coloring upon topology changes. In fact, a stateful D1EC reduces the algorithm’s convergen…

Mathematical optimization:QA Mathematics::QA75 Electronic computers. Computer science [Q Science]TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESChannel allocation schemesHeuristic (computer science)Computer scienceSettore ING-INF/03 - Telecomunicazioni:T Technology (General) [T Technology]Topology (electrical circuits)Greedy coloringEdge coloringTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESStateful firewall:Q Science (General) [Q Science]TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYConvergence (routing)Simulated annealing:TK Electrical engineering. Electronics Nuclear engineering [T Technology]Channel assignment Edge coloring Simulated annealing.MathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

A heuristic for fast convergence in interference-free channel assignment using D1EC coloring

2010

This work proposes an efficient method for solving the Distance-1 Edge Coloring problem (D1EC) for the assignment of orthogonal channels in wireless networks with changing topology. The coloring algorithm is performed by means of the simulated annealing method, a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a suboptimal coloring scheme. Furthermore, a stateful implementation of the D1EC scheme is proposed, in which network coloring is executed upon topology changes. The stateful D1EC is also based on simulated annealing and reduces the algorithm’s convergence time by one order of magnitude in …

Mathematical optimizationSettore ING-INF/03 - TelecomunicazioniComputer scienceHeuristic (computer science)Wireless networkTopology (electrical circuits)[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationGreedy coloringEdge coloringStateful firewallSimulated annealingConvergence (routing)Channel assignment Edge coloring Simulated annealing.Algorithm
researchProduct

MCMIPv6: Multicast Configuration-based Mobile IPv6 protocol

2010

International audience; Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the research community. The most famous ones are HMIPv6 and FMIPv6 tackling each a specific issue. On the one hand, FMIPv6 introduces a solution to effectively minimize the L2/L3 latency and avoid the packets losses during the handover procedure. On the other hand, HMIPv6 is e…

Mobility modelVehicular ad hoc networkMulticastComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computing020206 networking & telecommunications02 engineering and technology[SPI]Engineering Sciences [physics]Stateful firewallMobile IP0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMobility managementComputingMilieux_MISCELLANEOUSComputer network
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct