EAI Endorsed Transactions on Industrial Networks and Intelligent Systems

EAI Endorsed Transactions on Industrial Networks and Intelligent Systems

Basic info

  • Publisher: European Alliance for Innovation
  • Country of publisher: belgium
  • Date added to EuroPub: 2019/Jun/07

Subject and more

  • LCC Subject Category: Computer and Information Science, Industrial Management, Data Communication and Networks
  • Publisher's keywords: Ubiquitous Computing, Cloud Computing and Cyber-Physical System, Data, Industrial Networks, Intelligent Systems
  • Language of fulltext: english

Publication charges

  • Article Processing Charges (APCs): No
  • Submission charges: No
  • Waiver policy for charges? No

Editorial information

Open access & licensing

  • Type of License: CC BY
  • License terms
  • Open Access Statement: Yes
  • Year open access content began: 2014
  • Does the author retain unrestricted copyright? True
  • Does the author retain publishing rights? True

Best practice polices

  • Permanent article identifier: DOI
  • Content digitally archived in:
  • Deposit policy registered in: None

This journal has '95' articles

Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols

Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols

Authors: Zhengguo Sheng, Chunsheng Zhu, Victor C. M. Leung
( 0 downloads)
Abstract

Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as important in IoT communications. In this paper, we present a RESTful web service architecture for energy-constrained wireless sensor networks (WSNs) to enable remote data collection from sensor devices in WSN nodes. Specifically, we consider both IPv6 protocol support in WSN nodes as well as an integrated gateway solution to allow any Internet clients to access these nodes.We describe the implementation of a prototype system, which demonstrates the proposed RESTful approach to collect sensing data from a WSN. A performance evaluation is presented to illustrate the simplicity and efficiency of our proposed scheme.

Keywords: Internet-of-things, IPv6, RESTful, wireless sensor netorks
Security and Privacy in Online Social Networks: A Survey

Security and Privacy in Online Social Networks: A Survey

Authors: Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu
( 0 downloads)
Abstract

The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.

Keywords: Architecture of OSN, Online Social Networks, OSN Attacks, OSN Vulnerability and risks
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case

On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case

Authors: Manabu Tsukada, José Santa, Satoshi Matsuura, Thierry Ernst, Kazutoshi Fujikawa
( 0 downloads)
Abstract

One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by using constrained testbeds and carrying out minor tests. In this line, the present work reviews the issues that pioneers in the area of vehicular communications and, in general, in telematics, have to deal with if they want to perform a good evaluation campaign by real testing. The key needs for a good experimental evaluation is the use of proper software tools for gathering testing data, post-processing and generating relevant figures of merit and, finally, properly showing the most important results. For this reason, a key contribution of this paper is the presentation of an evaluation environment called AnaVANET, which covers the previous needs. By using this tool and presenting a reference case of study, a generic testing methodology is described and applied. This way, the usage of the IPv6 protocol over a vehicle-to-vehicle routing protocol, and supporting IETF-based network mobility, is tested at the same time the main features of the AnaVANET system are presented. This work contributes in laying the foundations for a proper experimental evaluation of vehicular networks and will be useful for many researchers in the area.

Keywords: Experimental Evaluation, Vehicular Ad-hoc Networks, Wireless Multihop Communication, Network Mobility, Cooperative ITS, Intelligent Transportation Systems
A Performance Perspective on Choosing between Single Aggregate and Multiple Aggregates for GENI Experime nts

A Performance Perspective on Choosing between Single Aggregate and Multiple Aggregates for GENI Experime nts

Authors: Zongming Fei, Ping Yi, Jianjun Yang
( 0 downloads)
Abstract

The Global Environment for Network Innovations (GENI) provides a virtual laboratory for exploring future internets at scale. It consists of many geographically distributed aggregates for providing computing and networking resources for setting up network experiments. A key design question for GENI experimenters is where they should reserve the resources, and in particular whether they should reserve the resources from a single aggregate or from multiple aggregates. This not only depends on the nature of the experiment, but needs a better understanding of underlying GENI networks as well. This paper studies the performance of GENI networks, with a focus on the tradeoff between single aggregate and multiple aggregates in the design of GENI experiments from the performance perspective. The analysis of data collected will shed light on the decision process for designing GENI experiments.

Keywords: GENI, network testbed, network measurement, experiment design
A Critical Review of the Routing Protocols in Opportunistic Networks

A Critical Review of the Routing Protocols in Opportunistic Networks

Authors: John Panneerselvam, Anthony Atojoko, Kim Smith, Lu Liu, Nick Antonopoulos
( 0 downloads)
Abstract

The goal of Opportunistic Networks (OppNets) is to enable message transmission in an infrastructure less environment where a reliable end-to-end connection between the hosts in not possible at all times. The role of OppNets is very crucial in today’s communication as it is still not possible to build a communication infrastructure in some geographical areas including mountains, oceans and other remote areas. Nodes participating in the message forwarding process in OppNets experience frequent disconnections. The employment of an appropriate routing protocol to achieve successful message delivery is one of the desirable requirements of OppNets. Routing challenges are very complex and evident in OppNets due to the dynamic nature and the topology of the intermittent networks. This adds more complexity in the choice of the suitable protocol to be employed in opportunistic scenarios, to enable message forwarding. With this in mind, the aim of this paper is to analyze a number of algorithms under each class of routing techniques that support message forwarding in OppNets and to compare those studied algorithms in terms of their performances, forwarding techniques, outcomes and success rates. An important outcome of this paper is the identifying of the optimum routing protocol under each class of routing.

Keywords: buffer, forwarding, prediction, routing
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed

Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed

Authors: Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi
( 0 downloads)
Abstract

IPv6 has yet to become more than a worthy successor of IPv4, which remains, for now, the dominant Internet Protocol. This is due to the complicated transition period through which the Internet will have to go, until IPv6 will completely replace IPv4. One of the challenges introduced by this transition is to decide which technology is more feasible for a particular network scenario. To that end, this article proposes the IPv6 Network Evaluation Testbed (IPv6NET), a research project whose ultimate goal is to obtain feasibility data in order to formulate a coherent, scenario-based IPv6 transition strategy. The paper presents the overview of IPv6NET, the testing methodology and empirical results for a specific network scenario. The presented empirical feasibility data includes network performance data such as latency, throughput, packet loss, and operational capability data, such as configuration, troubleshooting and applications capability.

Keywords: IPv6 transition, IETF IPv6 scenario, 464 scenario, Enterprise Networks, IPv6NET, Asamap, MAPe, MAPt, DSLite, 464XLAT
A networkless data exchange and control mechanism for virtual testbed devices

A networkless data exchange and control mechanism for virtual testbed devices

Authors: Tim Gerhard, Dennis Schwerdel, Paul Müller
( 0 downloads)
Abstract

Virtualization has become a key component of network testbeds. However, transmitting data or commands to the test nodes is still either a complicated task or makes use of the nodes' network interfaces, which may interfere with the experiment itself. This paper creates a model for the typical lifecycle of experiment nodes, and proposes a mechanism for networkless node control for virtual nodes in such a typical experiment lifecycle which has been implemented in an existing testbed environment.

Keywords: Testbed, Control Interface, Node Control
Towards an augmented reality guiding system for assisted indoor remote vehicle navigation

Towards an augmented reality guiding system for assisted indoor remote vehicle navigation

Authors: Héctor Martínez, Seppo Laukkanen
( 0 downloads)
Abstract

Scientific facilities usually require the use of vehicles controlled remotely by an operator relying on the information provided by a camera. However, the operator lacks of depth perception, which makes difficult the navigation. Providing additional information by means of Augmented Reality (AR) may enhance the safety and accuracy of the navigation. AR has been used in outdoor navigation systems. However, the technologies for outdoor systems cannot be directly ported to indoor environments and hence new techniques are required. Although several works for AR-based human indoor navigation have been proposed, to our best knowledge there are no similar studies for assisted indoor remote vehicle navigation. In this paper, a new prototype for assisted indoor remote vehicle navigation is proposed. The prototype provides the operator with an augmented view of the remote scene and complemented with additional features. The prototype has been tested in a small-scale setup with promising results.

Keywords: assisted navigation, augmented reality, indoor navigation, remote vehicle navigation
Smart Grid Attacks and Countermeasures

Smart Grid Attacks and Countermeasures

Authors: Eric McCary, Yang Xiao
( 0 downloads)
Abstract

The term “Smart Grid” has been coined and used for several years to describe the efforts of the current power grid modernization effort. This effort plans to introduce self-healing, energy efficiency, reliability, and security using two-way digital communications and control technology, along with a host of other valuable attributes. As a bi-product of this modernization and newly gained systems interoperability, new communications and management interfaces are produced in both the cyber realm and physical domains. The increase of the public physical presence and cyber footprint opens up avenues for compromise to hackers and individuals with malicious intent. This survey paper will categorize and summarize vulnerabilities in the framework of the current power grid and the software and hardware which is currently being used to upgrade the grid. The paper will also detail known countermeasures which can be used to mitigate or eliminate attacks which exploit such vulnerabilities.

Keywords: Smart Grid, Security, Attacks, Countermeasures
A Trusted Mobile Payment Scheme Based on Body Area Networks

A Trusted Mobile Payment Scheme Based on Body Area Networks

Authors: Huawei Zhao, Jiankun Hu
( 0 downloads)
Abstract

With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted devices, mobile payment faces serious security problems. To address the problems, this paper designs a trusted mobile payment scheme based on body area networks. The scheme builds a bridge between a body area network deployed on the human body and an intelligent mobile phone by the fuzzy vault technology and the human interference, and imports the security from a body area network to the mobile payment to establish a trusted mobile payment system. Because the scheme uses PPG signals with high-entropies to produce authentication data, its security is superior to traditional mobile payment schemes; at the same time the scheme uses trusted body area networks to design mobile payment systems and does not use external trusted devices, which is convenient to the users.

Keywords: body area networks, trusted mobile payment, security, biosensor nodes, fuzzy vault, PPG
Cloud Based Mobile Network Sharing: A New Model

Cloud Based Mobile Network Sharing: A New Model

Authors: Malla Reddy Sama, Yvon Gourhant, Lucian Suciu
( 0 downloads)
Abstract

The tradition network sharing models on existing mobile architecture is a challenging for the mobile operator to cope the future competitive market while increasing average revenue per user. In fact, to sustain the future data tsunami, the operators are already investing in their network. However, they are not yet capturing their investments. The average revenue per user has declined. Moreover, the static and rapid commoditization of network equipments and service provisioning are pushing the mobile operators’ to adopt different strategies such as networking sharing in the access and core network for to reduce OPEX and CAPEX. In this paper, we proposed new models for mobile operators to share their network through cloud platform (e.g. pay-as-you-go) in order to open new business strategies and to reduce CAPEX and OPEX. On the other hand, this proposal also cops the future data tsunami and introduces more flexibility, elasticity and on-demand features to the LTE/EPC architecture.

Keywords: LTE/EPC, Cloudification, Infrastructure sharing, MVNO and Emerging Markets
Information seeking behaviour and purchasing decision: case study in digital cameras

Information seeking behaviour and purchasing decision: case study in digital cameras

Authors: Agnes W.Y. Chan, Eddie H.T. Ko, Eric M.Y. Ho, Dickson K.W. Chiu, Elza Y.L. Chan
( 0 downloads)
Abstract

This case study explores the information seeking behaviour of digital camera consumers based on Assael’s consumer information acquisition and processing model. 135 responses were received from potential target group who had purchased or was planning to purchase digital cameras. Findings show that respondents who had not purchased digital camera before tended to seek for related information and generally spent more time on the search. Motivation of information seeking triggered by risk and uncertainty is also supported by resulting data .Significant difference was found in information seeking and time spent on the search based on different education attainment and income level of consumers. These results give hints to promoters to outline strategies for capturing potential customers based on their information seeking behaviour, as well as highlight informational supports that could be provided by relevant information agencies such as consumer councils and public libraries.

Keywords: information seeking behaviour, digital camera, case study
Wireless Broadband Opportunities through TVWS for Networking in Rural areas of Africa

Wireless Broadband Opportunities through TVWS for Networking in Rural areas of Africa

Authors: Dramane Ouattara, Mohamed Aymen Chalouf, Francine Krief, Omessaad Hamdi
( 0 downloads)
Abstract

In this paper, we propose a new approach based on Cognitive Radio technology to address the challenges for ensuring connectivity in remote areas of Africa. Indeed, the current network coverage is concentrated around the cities with high density of population. Through the deployment of Cognitive Radio, emergency services in rural areas will benefit from low cost access networks. Cognitive Radio will be used to manage the selection/switching across different frequency UHF/VHF bands or TV White Spaces (TVWS), while avoiding interference.

Keywords: Cognitive Radio, TV White Spaces, Rural areas, Remote zone connectivity, Emergency services
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems

An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems

Authors: Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher
( 0 downloads)
Abstract

Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly detection techniques for big data and this ignites a confusion for the data miners. In this paper, we categorise anomaly detection techniques based on nearest neighbours, clustering and statistical approaches and investigate the performance analysis of these techniques in critical infrastructure applications such as SCADA systems. Extensive experimental analysis is conducted to compare representative algorithms from each of the categories using seven benchmark datasets (both real and simulated) in SCADA systems. The effectiveness of the representative algorithms is measured through a number of metrics. We highlighted the set of algorithms that are the best performing for SCADA systems.

Keywords: Anomaly detection, SCADA systems, big data
GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources

GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources

Authors: Thierno Ahmadou Diallo, Olivier Flauzac, Luiz-Angelo Steffenel, Samba N’Diaye
( 0 downloads)
Abstract

This article presents GRAPP&S (Grid APPlication & Services), a specification of an E-learning architecture for the decentralized sharing of educational resources. By dealing with different resources such as files, data streams (video, audio, VoIP), queries on databases but also access to remote services (web services on a server, on a cloud, etc.), GRAPP&S groups the resources of each institution in the form of a community and allows sharing among different communities. Educational resources are managed on a transparent manner through proxies specific to each type of resources. The transparency provided by proxies concerns the location of sources of educational data, the processing of queries, the composition of the results and the management of educational data consistency. Furthermore, the architecture of GRAPP&S has been designed to allow security policies for data protection, both within a community and between different communities.

Keywords: E-learning, Peer-to-Peer, Prefix routing, Data proxies

About Europub

EuroPub is a comprehensive, multipurpose database covering scholarly literature, with indexed records from active, authoritative journals, and indexes articles from journals all over the world. The result is an exhaustive database that assists research in every field. Easy access to a vast database at one place, reduces searching and data reviewing time considerably and helps authors in preparing new articles to a great extent. EuroPub aims at increasing the visibility of open access scholarly journals, thereby promoting their increased usage and impact.