Science topic

Internet Architecture - Science topic

Explore the latest publications in Internet Architecture, and find Internet Architecture experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Internet Architecture (10,000)
Sorted by most recent
Article
Full-text available
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to dist...
Article
Full-text available
Mission critical solutions are essential for providing communications and services in the case of the troubles with connectivity that are often found in infrastructure-based solutions. Such solutions are typically used in the case of disasters, lack of energy, etc. There exist several narrowband solutions that provide countrywide coverage in certai...
Article
Full-text available
In a world with increasing simplicity to store, transfer, and analyze large volumes of data, preserving data confidentiality and integrity of Internet traffic by default becomes more and more important. Unfortunately, a large gap exists between low-security opportunistic encryption and trust-on-first-use (TOFU) protocols, and high-security communic...
Article
Full-text available
Named data networking (NDN) is gaining momentum as a future Internet architecture. NDN is a type of information‐centric networking (ICN) that attempts to change the current Internet architecture from host/location‐centric to content‐centric, where data retrieving is done by the names of the contents irrespective of the location of the data. A mecha...
Article
Full-text available
The Internet of Things (IoT) and its current IETF and IEEE dual stack model have been facing limitations, requiring applications to overcome tough constraints by their own, narrowing the full potential of this concept. For instance, the IoT dual stack model does not entirely address or support perennial naming, immutable data provenance, data accou...
Article
Full-text available
The number of publicly exposed Internet of Things (IoT) devices has been increasing, as more number of these devices connected to the internet with default settings. The devices accessed with default credentials are getting compromised with brute force attempts or the vulnerable devices are compromised with exploits to install the malware and perfo...
Article
Full-text available
Over recent years, traditional manufacturing factories have been accelerating their transformation and upgrade toward smart factories, which are an important concept within Industry 4.0. As a key communication technology in the industrial internet architecture, time-sensitive networks (TSNs) can break through communication barriers between subsyste...
Article
Full-text available
The Internet consists of distributed and interconnected autonomous systems (ASs). The flexibility afforded by the Internet architecture ensures that timely changes to the network topology can occur without centralized control. The Border Gateway Protocol (BGP) is an Internet protocol that routes the Internet traffic and exchanges the information be...
Thesis
Full-text available
Named data networking (NDN) is a content-centric future Internet architecture that uses routable content names instead of IP addresses to achieve location-independent forwarding. Nevertheless, NDN's design is limited to offering hosted applications a simple content pull mechanism. As a result, increased complexity is needed in developing applicatio...
Preprint
Full-text available
Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning...
Article
Full-text available
In recent years, with the continuous development of IT industry, network virtualization technology has gradually developed into a hotspot of research and application in the field of communication because IT allows the construction of customized virtual network (VN) on shared physical infrastructure. In particular, the proposal of wireless network v...
Article
Full-text available
The current Internet architecture is not suitable for the growing data (generated from billions of devices) and contents (stored in multiple geographical locations/data centers). There is a need for an efficient content distribution, addressing, secure data transmission, stateful forwarding, scalability, etc., in the Internet layer communication. N...
Article
Full-text available
Network security is becoming increasingly important to personal computer users, businesses, and the military. Security became a major concern with the advent of the internet, and understanding the history of security allows a better understanding of the emergence of security technology. Many security threats can occur due to the structure of the in...
Article
Full-text available
Named-Data Networking (NDN) is a future Internet architecture known as the most innovative Information-centric Networking (ICN) system capable of resolving many traditional IP-based networking issues. To track suspicious and unsatisfied interests, much current research focuses on network threats such as Non-Collusive Interest Flooding Attacks (NCIF...
Article
Full-text available
This research describes the simple implementation of asynchronous distributed cellular automata and decentralized swarms of asynchronous distributed cellular automata built on top of inter-planetary file system's publish-subscribe (IPFS PubSub) experimentation. Various publish-subscribe (PubSub) models are described. As an illustration, two distrib...
Article
Full-text available
Biking is gaining in popularity all around the world as a healthy and environmentally friendly mode of transportation. Urban policies tend to encourage citizens to use bicycles. This can be done by creating new cycling infrastructures, the renovation of old ones or the deployment of bike-sharing systems (BSS). These policies having a cost, understa...
Technical Report
Full-text available
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to analyze network traffic to deduce information related to application-layer activities, fine-grained user behaviors, or traffic content, even in the presence of traffic encryption or traffic obfuscation. Different from traditional TA, FGTA approaches are usua...
Article
Full-text available
Today, the internet requires many additional mechanisms or protocols to support various ever-growing applications. As a future internet architecture candidate, the Named Data Network (NDN) offers a solution that naturally fulfills this need. One of the critical components in NDN is cache. Caching in NDN solves bandwidth usage, server load, and serv...
Article
Full-text available
Named data networking (NDN) is one of the emerging and promising paradigms of the future internet architecture. An essential feature in NDN is in-network caching, where the contents are decoupled from their physical locations to achieve an effective and consistent content distribution. However, caching capacity in NDN is relatively small and cannot...
Article
Full-text available
Wireless sensor networks (WSNs) have several important applications, both in research and domestic use. Generally, their main role is to collect and transmit data from an ROI (region of interest) to a base station for processing and analysis. Therefore, it is vital to ensure maximum coverage of the chosen area and communication between the nodes fo...
Article
Full-text available
Content-centric networking (CCN) has emerged as a promising future Internet architecture that brings effective content retrieval mechanism. In CCN, the contents are accessed using their names instead of searching for the host location in the network. To improve Quality-of-Service for the users, CCN offers the in-network caching capability that plac...
Article
Full-text available
The coordinated development of big data, Internet of Things, cloud computing and other technologies has led to an exponential growth in Internet business. However, the traditional Internet architecture gradually shows a rigid phenomenon due to the binding of the network structure and the hardware. In a high-traffic environment, it has been insuffic...
Article
Full-text available
Information-centric networking (ICN) is expected to be a candidate for future internet architecture, and it supports features such as multicast that improves bandwidth utilization and transmission efficiency. However, multicast itself does not provide congestion control. When multiple multicast groups coexist, multicast traffic may exhaust all netw...
Article
Full-text available
The Internet architecture has been undergoing a significant refactoring, where the past preeminence of transit providers has been replaced by content providers, which have a ubiquitous presence throughout the world, seeking to improve the user experience, bringing content closer to its final recipients. This restructuring is materialized in the eme...
Preprint
Full-text available
The spirit of "blockchain technology" is a distributed database in which saved data is transparent, accountable, public, immutable, and traceable. This base-level disruptive technology can boost the security and privacy-related efficiency of various domains. As Bangladesh is currently aiming for sustainable development, blockchain technology adopti...
Article
Full-text available
The proliferation of connected devices in the Internet of Things (IoT) presents a connectivity challenge. The future internet will require a paradigm shift in which content is evaluated on the basis of “What” it is rather than “Where” it originated. ICN’s goal is to provide the benefits of name-based content addressing in order to facilitate scalab...
Article
Full-text available
The spirit of “blockchain technology” is a distributed database in which saved data is transparent, accountable, public, immutable, and traceable. This base-level disruptive technology can boost the security and privacy-related efficiency of various domains. As Bangladesh is currently aiming for sustainable development, blockchain technology adopti...
Article
Full-text available
Maritime processes involve actors and systems that continuously change their underlying environment, location and threat exposure. Thus, risk mitigation requires a dynamic risk assessment process, coupled with an adaptive, event driven security enforcement mechanism, to efficiently deal with dynamically evolving risks in a cost efficient manner. In...
Preprint
Full-text available
Entangled quantum communication is advancing rapidly, with laboratory and metropolitan testbeds under development, but to date there is no unifying Quantum Internet architecture. We propose a Quantum Internet architecture centered around the Quantum Recursive Network Architecture (QRNA), using RuleSet-based connections established using a two-pass...
Article
Full-text available
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names instead of locations and creates essential changes in the abstraction of network services from "delivering packets to specific destinations” to "retrieving data with special names" makes. This fundamental change creates new opportunities and intellectu...
Article
Full-text available
As people’s demand for application services continues to grow, traditional TCP and IP network architectures face many security and mobility challenges. In order to completely eliminate these problems, scientists have proposed a representative new Internet architecture, such as a content center network. Each node in the content center network has a...
Chapter
Full-text available
SIMBox fraud is one of the most sophisticated fraud types in the recent times. Telecom regulators and mobile operators are facing massive revenue losses as bypass fraud continues to be one of the most prolific and costly frauds. To terminate international inbound calls to local subscribers, gateway equipment such as fixed, Voice over Internet Proto...
Article
Full-text available
In recent years, Named Data Networking (NDN) has attracted researchers’ attention as a new internet architecture. NDN changes the internet communication paradigm from a host-to-host IP model to a name-based model. Thus, NDN permits the retrieval of requested content by name, from different sources and via multiple paths, and the use of caching in i...
Article
Full-text available
This article proposes a new approach for intelligent indoor 3D positioning that works in the millimeter waves (that constitutes a cornerstone of 5G networks). The solution is based on a combination of a multilayer perceptron network and a self-organizing map. The solution relies on a precise model of the millimeter frequency channel at 60 GHz and t...
Article
Full-text available
Information-Centric Networking (ICN) emerges as a promising architecture for the future Internet to keep up with the tremendous growth of Internet users and the explosive increase of mobile data traffic. ICN can be coupled with Disruption Tolerant Networking (DTN) to overcome the limitations of the current Internet architecture in some challenging...
Article
Full-text available
Storage resources and caching techniques permeate almost all areas of communication networks today. In the near future, caching will play an important role in storage-assisted Internet architectures, information-centric networks and wireless systems, reducing operating and capital expenses and improving services for consumers. users. In light of th...
Article
Full-text available
Content-Centric Networking (CCN) has emerged as a potential Internet architecture that supports name-based content retrieval mechanism in contrast to the current host location-oriented IP architecture. The in-network caching capability of CCN ensures higher content availability, lesser network delay, and leads to server load reduction. It was obser...
Article
Full-text available
Internet of Things (IoT) has emerged as a novel paradigm that focuses on connecting a large number of devices with the Internet infrastructure. To address the performance requirements of IoT devices, the Content-Centric Networking (CCN) becomes an encouraging future Internet architecture that emphasizes name-based content access, instead of searchi...
Article
Full-text available
We study the properties of electronic circuits after linearization around a fixed operating point in the context of closed-loop stability analysis. When distributed elements, like transmission lines, are present in the circuit it is known that unstable circuits can be created without poles in the complex right half-plane. This undermines existing c...
Article
Full-text available
We introduce a Coherent-MIMO Δφ-OTDR based sensing technique that uses digital frequency division multiplexing of probing sequences in order to mitigate the coherent fading issue in Δφ-OTDR. Orthogonal Frequency Division Multiplexing (OFDM) is used to probe the optical channel on several electrical subcarriers, which responses are then combined acc...
Preprint
Full-text available
This paper is the first in a series titled an addendum in mathematics. These papers concern themselves with the clearing up and removal of certain limitations of mathematics, which have held mathematics back for too long. Unfortunately, the internet architecture of mathematics does not allow for live updates, so this paper shall be spilt into parts...
Conference Paper
Full-text available
The development of computer architectures has been motivated and is motivated by practical applications , which today have reached the level of creating new valuable virtual and tangible assets. Distributed information technology (розподілена інформаційна технологія, РІТ; RIT) of scientific and organizational activity (науково-організаційної діяльн...
Poster
Full-text available
Reference #: BMS-RACSC-2021-HT-52 Proposal Title: Recent Advances in Next Generation AI based Intelligent Networks & related Security Issues. Summary: This SI of Journal of Recent Advances in Computer Science and Communications covers the fundamental and generic research for a better understanding of next generation communication technologies and...
Article
Full-text available
Information Centric Networking (ICN) is a promising paradigm shift that aims to tackle the traditional Internet architectural problems and to fulfill the future Internet requirements. The traditional Internet architecture is a host-oriented architecture (i.e., TCP/IP approach) due to which the Internet of Things (IoT) have been facing issues relate...
Article
Full-text available
Film and television itself is a product of culture and innovation, combining digital technology, creative thinking, and artistic design. In the rapid development of 3D film and television, the situation of scene design and production has also become an important role. In a typical environment, the main scene plays the role of film and television an...
Article
Full-text available
O artigo pretende demonstrar que a regulação brasileira atende aos interesses das companhias privadas de plataformas digitais ao não endereçar corretamente as características do mercado das plataformas digitais. Sua hipótese é que a regulação negligenciou esse mercado, que tende ao monopólio, e, posteriormente, falhou em compreendê-lo. O artigo tra...
Article
Full-text available
Caching is one of the most promising areas in the field of future internet architecture like Information-centric Networking, Software Defined Networking, and IoT. In Web caching, most of the web content is readily available across the network, even if the webserver is not reachable. Several existing traditional caching methods and cache replacement...
Article
Full-text available
As the basic building block of any information security system, identity and access management (IAM) solutions play vital role in enterprise's security programmes. Providing centric solutions for IAM is inefficient in terms of having single point of failure, high cost, duplication and complexity to the users. Recently, emerging the distributed ledg...
Article
Full-text available
This paper deals with the problem of multicast routing and the allocation of wavelengths in a WDM network with optical splitters and converters. We present an exact formulation in integer linear programming (ILP) to find a set of optical structures connecting a source to a set of destination nodes. We use a new optical structure called hierarchical...
Article
Full-text available
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure. This architecture realizes centralized management by separating the control plane and the data-forwarding plane of the network. However, due to this feature, SD...
Article
Full-text available
The rapid growth of video traffic poses serious challenges to the current Internet. Content-Centric Networking (CCN) as a promising candidate has been proposed to reengineer the Internet architecture. The in-network caching and named content communication model of CCN can enhance the video streaming applications and reduce the network workload. Due...
Article
Full-text available
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently available security requirement engineering methodologies leads security requirements engineers to an...
Article
Full-text available
Key requirements for a better performance of multimedia applications typically include lower latency, improved security, faster content retrieval, and adjustability to the traffic load. However, the current Internet often fails to meet the requirements due to the drawbacks of the host-oriented communication architecture. Those drawbacks can be over...
Article
Full-text available
Things are interconnected using information and communication technologies in smart cities, forming Internet of Things (IoT). The Internet of Vehicles (IoV) refers to an IoT application, where the urban vehicle fleet forms a worldwide network, using V2X (Vehicle-to-Everything) communications. The 5G is the new generation of cellular networks that w...
Thesis
Full-text available
Information-Centric Networking (ICN) is a common approach to the Internet of the future. However, transitioning to the new Internet architecture right away is impractical if not impossible. Hence, there will be some period of coexistence of ICN and IP. This paper investigates the support of security and privacy features in the three most popular ov...
Article
Full-text available
Users can access the Internet anywhere they go at any time due to the advancement of communications and networking technologies. The number of users and connected devices are rapidly increasing, and various forms of content are becoming increasingly available on the Internet. Consequently, several research ideas have emerged regarding the storage p...
Article
Full-text available
NDN is one of the new emerging future internet architectures which brings up new solutions over today’s internet architecture, facilitating content distribution, in-network caching, mobility support, and multicast forwarding. NDNs ubiquitous in-network caching allows consumers to access data directly from the intermediate router’s cache. However, i...