Results 1 - 10
of
125
Subspace Communication
, 2014
"... We are surrounded by electronic devices that take advantage of wireless technologies, from our computer mice, which require little amounts of information, to our cellphones, which demand increasingly higher data rates. Until today, the coexistence of such a variety of services has been guaranteed by ..."
Abstract
- Add to MetaCart
of the spectrum by legacy sys-tems. Cognitive radio exhibits a tremendous promise for increasing the spectral efficiency for future wireless systems. Ideally, new secondary users would have a perfect panorama of the spectrum usage, and would opportunistically communicate over the available re-sources without
An Approach to Verification and Validation of a Reliable Multicasting Protocol
"... Abstract: This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. Tile protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a ..."
Abstract
- Add to MetaCart
combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concun'ent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) tile initial coding
Formal Privacy Analysis of Communication Protocols for Identity Management
"... Abstract. Over the years, formal methods have been developed for the analy-sis of security and privacy aspects of communication in IT systems. However, existing methods are insufficient to deal with privacy, especially in identity man-agement (IdM), as they fail to take into account whether personal ..."
Abstract
-
Cited by 4 (4 self)
- Add to MetaCart
personal information can be linked to its data subject. In this paper, we propose a general formal method to analyze privacy of communication protocols for IdM. To express privacy, we represent knowledge of personal information in a three-layer model. We show how to deduce knowledge from observed messages
On Modeling Low-Power Wireless Protocols Based on Synchronous Packet Transmissions
"... Abstract—Mathematical models play a pivotal role in understanding and designing advanced low-power wireless systems. However, the distributed and uncoordinated operation of traditional multi-hop low-power wireless protocols greatly complicates their accurate modeling. This is mainly because these pr ..."
Abstract
- Add to MetaCart
experiments on a 139-node testbed, that characterizing packet receptions and losses as a sequence of independent and identically distributed (i.i.d.) Bernoulli trials—a common assumption in protocol modeling but often illegitimate for LT—is largely valid for ST. We then show how this finding simplifies
Formal Analysis of a Privacy-Preserving Billing Protocol
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract
- Add to MetaCart
Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker
DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
"... Abstract. Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attac ..."
Abstract
- Add to MetaCart
attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment
Abstract Multichannel Communication in Contiki's Low-power IPv6 Stack
"... Vast majority of wireless appliances used in household, industry and medical field share the ISM frequency band. These devices need to coexist and thus are challenged to tolerate their mutual interference. One way of dealing with this is by using frequency hopping; where the device changes its radio ..."
Abstract
- Add to MetaCart
radio channel periodically. Consequently, communications will not suffer from the same interference each time; instead, it should be fairer and more stable. This thesis investigates the aforementioned problem in the field of low power wireless sensor networks and Internet of Things where Contiki OS
XTP specification and validation with LOTOS
"... The validation is a very important phase in the development cycle of communication protocols. This activity is frequently accomplished by a reachability analysis. In this paper, we are interested in the study of the XTP protocol that constitutes a new high speed transport protocol standardized by I ..."
Abstract
- Add to MetaCart
by ISO. The objective is to detect different types of logic errors, before implementation phase, such as deadlock, unspecified reception and boundedness. To specify and verify XTP protocol, we use two formal models, the communicating finite state machine (C.F.S.M) to describe the behaviour of11we
Multi-Protocol Transport Layer QoS: An Emulation Based Performance Analysis for the Internet of Things
"... Abstract—Application specific interaction models will be required to support efficient communications between distributed applica-tions with disparate network requirements within the Internet of Things. This paper shows that intelligently selected transport protocols are able to provide increased ef ..."
Abstract
- Add to MetaCart
Abstract—Application specific interaction models will be required to support efficient communications between distributed applica-tions with disparate network requirements within the Internet of Things. This paper shows that intelligently selected transport protocols are able to provide increased
Guaranteeing Communication Quality in Real World WSN Deployments
"... April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by: ..."
Abstract
- Add to MetaCart
April 29, 2011Für UnsShe had never before seen a rabbit with either a waistcoat-pocket, or a watch to take out of it, and burning with curiosity, she ran across the field after it Lewis CarrollThe following document, written under the supervision of Dr. reviewed by:
Results 1 - 10
of
125