Science topic

Network Protocols - Science topic

Explore the latest publications in Network Protocols, and find Network Protocols experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Network Protocols (10,000)
Sorted by most recent
Article
Full-text available
Few technologies have been mired in hype more than blockchain, which is the underlying peer-to-peer network protocol for cryptocurrencies such as Bitcoin. Given the technology’s emphasis on purported “immutable ledgers” and trust-less sharing models, there has been a great deal of interest in applying blockchain to democratic reforms. From localize...
Article
Full-text available
We develop a protocol for entanglement generation in the quantum internet that allows a repeater node to use n -qubit Greenberger-Horne-Zeilinger (GHZ) projective measurements that can fuse n successfully entangled links , i.e., two-qubit entangled Bell pairs shared across n network edges, incident at that node. Implementing n -fusion, for n ≥ 3, i...
Presentation
Full-text available
Toipc: underwater sensor design, smart sensor design, underwater sensor network, underwater acoustic network protocol, underwater acoustic communication, underwater channel modeling, environment perception, ocean acoustic tomography, monitoring of underwater acoustic field, navigation, localization, tracking, detection, seafloor mapping, sub-bottom...
Article
Full-text available
A well‐optimized and well‐performed communication network protocol is necessary to build successful underwater acoustic sensor networks (UWASNs). But for wired and wireless communication, medium access control (MAC) has a great effect on network performance and optimization. But unlike land‐based MAC protocols, underwater MAC protocols come with va...
Article
Full-text available
One of the network communication systems in our surroundings that has a significant influence on our day-to-day lives is the satellite network. Many authentications and key agreement procedures have been developed for satellite communication systems in order to ensure secure communication. None, however, offer the satellite communication system wit...
Article
Full-text available
The exponential growth of internet connected devices in this past year has led to a significant increase in IoT targeted attacks. The lack of proper integration of security in IoT development life cycle along with a plethora of different protocols (e.g., Zigbee, LoRa, MQTT, etc.) have greatly impacted the resilience of such devices against cyber-at...
Article
Full-text available
In underwater acoustic communication (UAC) systems, the channel characteristics are mainly affected by spatiotemporal changes, which are specifically manifested by two factors: the effects of refraction and scattering caused by seawater layered media on the sound field and the random fluctuations from the sea floor and surface. Due to the time-vary...
Article
Full-text available
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols...
Article
Full-text available
Intrusion detection in wireless and, more specifically, Wi-Fi networks is lately increasingly under the spotlight of the research community. However, the literature currently lacks a comprehensive assessment of the potential to detect application layer attacks based on both 802.11 and non-802.11 network protocol features. The investigation of this...
Preprint
Full-text available
Polkadot is a network protocol launched in 2020 with the ambition of unlocking the full potential of blockchain technologies. Its novel multi-chain protocol allows arbitrary data to be transferred across heterogeneous blockchains, enabling the implementation of a wide range of novel use cases. The Polkadot architecture is based on the principles of...
Article
Full-text available
The task of managing a network is becoming increasingly complex due to the growing number of computers on the network running all kinds of operating systems and using different network protocols. The multitude of network monitoring and troubleshooting tools such as ping, traceroute, Fping, Pinger Network are only used to solve simple connection pro...
Article
Full-text available
Stateful network protocol fuzzing is one of the essential means for ensuring network communication security. However, the existing methods have problems, including frequent auxiliary message interaction, no in-depth state-space exploration, and high shares of invalid interaction time. To this end, we propose SATFuzz, a stateful network protocol fuz...
Conference Paper
Full-text available
The concept of peer-to-peer network is considered. Several common peer-to-peer protocols are analyzed. Features, advantages, and areas of application of each of the protocols are revealed. The main vulnerabilities of each protocol are analyzed. Among the peer-to-peer network protocols, the main ones were BitTorrent, Gnutella, G2, Tox, Skype and Eth...
Article
Full-text available
An Intrusion Detection System (IDS) is a tool used primarily for security monitoring, which is one of the security strategies for Supervisory Control and Data Acquisition (SCADA) systems. Distributed Network Protocol version 3 (DNP3) is the predominant SCADA protocol in the energy sector. In this paper, we have developed an effective and flexible I...
Article
Full-text available
The Internet of Things (IoT) technology improvement has led to concepts such as smart retail and supply chain management systems. The main problem with IoT‐based smart retail and supply chain management systems is the need for a high‐speed network for responding quickly to many transactions within the network. If the network is not able to respond...
Preprint
Full-text available
In videos, the human's actions are of three-dimensional (3D) signals. These videos investigate the spatiotemporal knowledge of human behavior. The promising ability is investigated using 3D convolution neural networks (CNNs). The 3D CNNs have not yet achieved high output for their well-established two-dimensional (2D) equivalents in still photograp...
Article
Full-text available
With the explosion of traffic demand in recent years, the integration of satellite optical networks and terrestrial networks (ISTN) creates a promising networking solution for future low-latency, high-rate, and high-capacity communications. Owing to the high cost of deploying and maintaining a satellite optical network, it is critical to carefully...
Article
Full-text available
Multicriteria decision-making (MCDM) is one of the most common methods used to select the best alternative from a set of available alternatives. Many methods in MCDM are presented in the academic literature, with the latest being the Fuzzy Decision by Opinion Score Method (FDOSM). The FDOSM can solve many challenges that are present in other MCDM m...
Article
Full-text available
The wireless sensor networks (WSNs) are special network which has purpose of gathering information in certain area. Multipath routing is the paramount path of addressing QoS and energy balancing concerns in low power and lossy networks (LLNs) especially in IoT technology. Most of the extant efforts bring the limited number of disjoint paths into pl...
Article
Full-text available
With the development of society, humans are becoming more and more dependent on the Internet. And there are exploitable vulnerabilities in network sharing protocol vulnerabilities that will cause great risks to individuals and society. Therefore, vulnerability mining technology has developed into an important research problem in the field of inform...
Thesis
Full-text available
This bachelor thesis focuses on the analysis and development of techniques for detecting anomalies in the application layer of network traffic within the industrial environment, more specifically in the detection of anomalies in the protocol called Distribution Network Protocol (DNP3). One of the main objectives of cyber attackers is related with...
Article
Full-text available
In this paper we present the design of an open-source and low-cost buoy prototype for remote monitoring of water quality variables in fish farming. The designed battery-powered system periodically measures temperature, pH and dissolved oxygen, transmitting the information locally through a low-power wide-area network protocol to a gateway connected...
Preprint
Full-text available
Cities around the world are increasingly promoting electric vehicles (EV) to reduce and ultimately eliminate greenhouse gas emissions. For example, the city of San Francisco aims to increase the number of EVs from tens of thousands to over quarter of a million by 2025. This huge number of EVs will put unprecedented stress on the power grid. To effi...
Article
Full-text available
The Domain Name System (DNS), which converts domain names to IP addresses, is a critical component of the internet infrastructure. Attackers exploit the existing potential vulnerabilities in this network protocol to launch their attacks. Distributed Reflection Denial of Service (DRDoS) DN S attacks are a type of Distributed Denial of Service (DDoS)...
Article
Full-text available
The current sports feedback system has high application value and is widely used in physical education courses, but it has problems such as large feedback error, long response time, and incomplete data, leading to poor effect of sports feedback system. In order to improve the effectiveness of sports feedback system, a sports feedback system based o...
Article
Full-text available
IETF 6TiSCH, which is composed of the IEEE802.15.4e and IPv6 RPL protocols, is a highly reliable and low-power industrial wireless network protocol stack. IEEE802.15.4e is the medium access control (MAC) layer protocol of the protocol stack—it defines a time-slotted channel hopping communication mode. IPv6 RPL is the network layer protocol of the p...
Article
Full-text available
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selec...
Article
Full-text available
The IPSec has been a widely used VPN (virtual private network) protocol due to its security and convenience. The security of IPsec itself plays a fundamental role in the overall security of the application system. However, it can be found from the existing research that because of some insecurity issues in the application process, the IPsec protoco...
Article
Full-text available
The minimal-degree distributed denial-of-service attack takes advantage of flaws in the adaptive mechanisms of network protocols, which could have a big impact on network service quality. It is very hard to find, has a low attack rate, and comes at a set time. Detection methods that have been used before have problems because they only use one type...
Preprint
Full-text available
Successful generation of photonic cluster states is the key step in the realization of measurement-based quantum computation and quantum network protocols. Several proposals for the generation of such entangled states from different solid-state emitters have been put forward. Each of these protocols come with their own challenges in terms of both c...
Preprint
Full-text available
Markov decision processes are a ubiquitous formalism for modelling systems with non-deterministic and probabilistic behavior. Verification of these models is subject to the famous state space explosion problem. We alleviate this problem by exploiting a hierarchical structure with repetitive parts. This structure not only occurs naturally in robotic...
Article
Full-text available
The implementation of the optimal Huffman coding technique for achieving proficient data compression, lower information redundancy and minimal utilization of the scarce bandwidth is essential to handle the effective processing of massive network data. In this paper, we employ cross-layer design technique among the data link, network and presentatio...
Article
Full-text available
With the improvement of industrial informatization, various industrial control system network protocols have also been widely used. The reliability of these protocols will directly affect the safety of industrial control systems. As an effective method that can automatically analyze system reliability, model checking has been widely used in the ver...
Article
Full-text available
Classifying test executions automatically as pass or fail remains a key challenge in software testing and is referred to as the test oracle problem. It is being attempted to solve this problem with supervised learning over test execution traces. A programme is instrumented to gather execution traces as sequences of method invocations. A small fract...
Article
Full-text available
A large amount of data would be generated during the process of microseismic monitoring, and data transmission with the cable has some shortcomings such as poor anti-interference, time-consuming, laborious, high cost, and low construction efficiency. On the other hand, the influence of signal diffraction and the multipath effect will greatly cut do...
Article
Full-text available
Most of the existing Medium Access Control (MAC) layer protocols for the Internet of Things (IoT) model the traffic generated by each IoT device via random arrivals such as those in a Poisson process. Under this model, since it is implied that IoT device traffic cannot be predicted, only reactive MAC-layer protocols in which the network responds to...
Article
Full-text available
Introduction: Catheter Associated Asymptomatic Bacteriuria persisting beyond 48 hours after catheter removal predisposes to the development of catheter associated urinary tract infections, necessitating treatment. Current surveillance strategies do not screen for infection detection after catheter removal, missing most of the clinically significan...
Article
Full-text available
Small and medium-sized enterprises (SMEs) are an indispensable part of the development of the market economy, and they occupy a major position in the national economic system. Nowadays, the information construction of SMEs is becoming more and more important. Having an informationized accounting system can speed up the economic development of SMEs....
Preprint
Full-text available
We present Leapfrog, a Coq-based framework for verifying equivalence of network protocol parsers. Our approach is based on an automata model of P4 parsers, and an algorithm for symbolically computing a compact representation of a bisimulation, using "leaps." Proofs are powered by a certified compilation chain from first-order entailments to low-lev...
Article
Full-text available
Covert channels in information systems may cause a protected data leakage and lead to violation of data confidentiality or integrity. Moreover, some types of covert channels can function even in case of network data encryption, tunneling or traffic firewall protection. A technique to eliminate such channels is traffic normalization which means send...
Preprint
Full-text available
Large-scale quantum networks with thousands of nodes require scalable network protocols and physical hardware to realize. In this work, we introduce packet switching as a new paradigm for quantum data transmission in both future and near-term quantum networks. We propose a classical-quantum data frame structure and explore methods of frame generati...
Article
Full-text available
Bluetooth low energy is an almost ubiquitous technology currently embedded in billions of power-constrained Internet of Things devices around the world. The Bluetooth mesh profile, released by the Bluetooth Special Interest Group in July 2017, allows Bluetooth low energy devices to form a mesh network, further enabling smart home and building appli...
Article
Full-text available
In order to facilitate the transition between networks and the integration of heterogeneous networks, the underlying link design of the current mainstream Information-Centric Networking (ICN) still considers the characteristics of the general network and extends the customized ICN protocol on this basis. This requires that the network transmission...
Article
Full-text available
With the rapid growth in healthcare demand, an emergent, novel technology called wireless body area networks (WBANs) have become promising and have been widely used in the field of human health monitoring. A WBAN can collect human physical parameters through the medical sensors in or around the patient’s body to realize real-time continuous remote...
Article
Full-text available
In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of the Industrial Internet-of-Things (IIoT) for smart manufacturing applications. The proposed architecture is composed of five layers covering sensing, network/protocol, transport enforced with BCT components, applic...
Article
Full-text available
The widely used network protocols play a crucial role in various systems. However, the protocol vulnerabilities caused by the design of the network protocol or its implementation by programmers lead to multiple security incidents and substantial losses. Hence, it is important to study the protocol fuzzing in order to ensure its correctness. However...
Article
Full-text available
The use of independent spanning trees (ISTs) has scientific applications in fault-tolerant requirement in network protocols and secure message distributions. Most of the designs of ISTs are for those interconnection networks with vertex symmetric property, implying that one can find ISTs rooted on a designated vertex, and, by the vertex symmetry pr...
Article
Full-text available
Internet of Vehicles (IoV) is a new concept, derived from combining VANET and Internet of Things (IoT), aiming at increasing road’ user safety and reducing the number of accidents. In IoV, different types of communication are possible, namely, vehicle-to-sensor, as the car is considered as a powerful multisensory object, vehicle-to-pedestrian i.e....
Article
Full-text available
Cellular networks have transformed the way we live and work. Traditional wired network protocol stacks do not operate well in mobile wireless situations. This is mostly due to the layered architecture and protocol stack implementation. Cross-layer design is one way to increase the stack's efficiency. Cross-layer design is based on the idea of optim...
Conference Paper
Full-text available
Ever since cyber attacks focused on industrial and critical infrastructure settings, the awareness of the security issues of these systems has increased. These industrial control systems (ICS) mainly focus on operation and availability-instead of providing general security features. Moreover, the current Industry 4.0 movement aggravates this securi...
Preprint
Full-text available
With the advent of cheap, miniaturized electronics, ubiquitous networking has reached an unprecedented level of complexity, scale and heterogeneity, becoming the core of several modern applications such as smart industry, smart buildings and smart cities. A crucial element for network performance is the protocol stack, namely the sets of rules and...
Article
Full-text available
By bringing industrial-grade robustness and reliability to Ethernet, Time Sensitive Networking (TSN) offers an IEEE standard communication technology that enables interoperability between standard-conformant industrial devices from any vendor. It also eliminates the need for physical separation of critical and non-critical communication networks, w...
Conference Paper
Full-text available
This research outlines the commercially available solutions available to technologically skilled, armed non-state actor organizations that seek to impede aggressive US and local government SIGINT efforts to monitor their communications. Clandestine fiber-optic network infrastructure, high-security hardware configurations, traffic analysis resistant...
Article
Full-text available
This paper presents an overview of the design and development of a prototype Global Dispatcher Interface (GDI) for the control of a group of lifts. The role of the dispatcher is to assign passenger calls to the optimal lift in a group, as decided by a dispatcher algorithm. The GDI is independent of the underlying algorithm, which may be distributed...
Article
Full-text available
Background Concerns have grown that post-acute sequelae of COVID-19 may affect significant numbers of survivors. However, the analyses used to guide policy-making for Australia’s national and state re-opening plans have not incorporated non-acute illness in their modelling. We, therefore, develop a model by which to estimate the potential acute and...