排序方式: 共有23条查询结果,搜索用时 46 毫秒
11.
Theodore Zahariadis Helen C. Leligou Panagiotis Trakadas Stamatis Voliotis 《Transactions on Emerging Telecommunications Technologies》2010,21(4):386-395
The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node's trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
12.
Residential networks are expected to open a huge market and introduce a bright, new era in telecommunications, by exponentially
increasing the network usage, via broadband, added value services. Despite the business risks, investments made by the telecommunication
industries clearly express the belief that the home networking market is about to take off. In this paper, a home network
architecture for the provision of interactive multimedia services is considered and various access and indoor networking alternatives
are presented. Then the focus is put on the Residential Gateway (RG), as a single point of networks convergence. Based on
prototypes development, laboratory experiments and field trials throughout Europe and USA, a modular and a compact RG hardware
architecture are described and compared, while the software architecture to support the RG functionality is described and
the main building blocks are analyzed. Finally, a Web browser-based network management and control application that provides
a visual metaphor of the RG is presented.
This revised version was published online in September 2006 with corrections to the Cover Date. 相似文献
13.
Telecommunication Systems - 相似文献
14.
Global roaming in next-generation networks 总被引:5,自引:0,他引:5
Zahariadis T.B. Vaxevanakis K.G. Tsantilas C.P. Zervos N.A. Nikolaou N.A. 《Communications Magazine, IEEE》2002,40(2):145-151
Next-generation mobile/wireless networks are already under preliminary deployment. Mobile/wireless all-IP networks are expected to provide a substantially wider and enhanced range of services. However, an evolutionary rather than revolutionary approach to the deployment of a global all-IP wireless/mobile network is expected. To support global roaming, next-generation networks will require the integration and interoperation of mobility management processes under a worldwide wireless communications infrastructure. In this article global roaming is addressed as one of the main issues of next-generation mobile networks. Apart from the physical layer connectivity and radio spectrum allocation plans, mobility in a hierarchical structured scheme is discussed. An all-IP wireless/mobile network combined with inherited mobility schemes of each network layer and Mobile IP extensions is proposed. In this respect the mobility management mechanisms in WLAN, cellular, and satellite networks are analyzed, and an all-IP architecture is described and an enhanced roaming scenario presented 相似文献
15.
Zahariadis T. Pramataris K. Zervos N. 《Electronics & Communication Engineering Journal》2002,14(4):133-142
Connecting each house to a broadband access network represents an unprecedented opportunity to offer added-value services and broadband Internet access to residential users and expand the customer base beyond the corporate environment. Home networks, however, may be the last barrier to end-to-end multimedia service provisioning. Although a large number of houses have PCs, modems or multimedia network-enabled appliances, the majority are not equipped to support their interconnection, and most consumers are unwilling or cannot afford large-scale home rewiring. This paper reviews the available home-networking technologies and provides a comparison of the competing broadband in-home technologies. The focus is on technologies that do not require rewiring the home, either reusing the existing wiring or using wireless technology. The paper also discusses the residential gateway (RG) initiative, which provides a single point of convergence between the in-home and the access networks 相似文献
16.
The Internet is incontrovertibly a great success that has changed our social and economic world. Today, over one billion users access the Internet on regular basis, more than 100 million users have downloaded at least one (multi) media file, and over 47 million of them do so regularly, searching in more than 160 exabytes of content. The content is expected to rise to more than 990 exabytes before 2012, fueled mainly by the users themselves [1]. It is envisaged that in the near- to mid-term future, mobile Internet will provide the means to share and distribute (new) multimedia content and services with superior quality and striking flexibility, in a trusted and personalized way, improving citizens? quality of life, working conditions, edutainment, and safety. 相似文献
17.
Terpsichori‐Helen N. Velivasaki Panagiotis Karkazis Theodore V. Zahariadis Panagiotis T. Trakadas Christos N. Capsalis 《Transactions on Emerging Telecommunications Technologies》2014,25(5):539-554
The usability of wireless sensor networks in modern applications requires the fulfillment of dynamic Quality of Service (QoS) requirements that can only be met in a reactive manner by the introduction of composite routing metrics, capturing several distinct network characteristics. However, combining routing metrics is neither a trivial nor an arbitrary task, given the routing protocol requirements and routing metrics properties. In this paper, the theoretical framework of routing algebra formalism is adopted and extended to incorporate single or composite routing metrics, because the satisfaction of routing algebra properties ensures convergence, optimality, and loop‐freeness. Moreover, packet forwarding indication is defined as a new trust metric for systems (a) with or (b) without network retransmissions to avoid forwarding attacks, while a novel composite routing metric is presented, combining link reliability and trust‐awareness in an additive manner, fulfilling the theoretical requirements. Finally, this composite metric is applied to the Routing Protocol for Low Power and Lossy Networks via simulations, which verify its efficiency in several scenarios, including the comparison between lexical and additive metric composition approaches. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
18.
H. C. Leligou P. Trakadas S. Maniatis P. Karkazis T. Zahariadis 《Wireless Communications and Mobile Computing》2012,12(12):1091-1103
As the applications of wireless sensor networks proliferate, the efficiency in supporting large sensor networks and offering security guarantees becomes an important requirement in the design of the relevant networking protocols. Geographical routing has been proven to efficiently cope with large network dimensions while trust management schemes have been shown to assist in defending against routing attacks. Once trust information is available for all network nodes, the routing decisions can take it into account, i.e. routing can be based on both location and trust attributes. In this paper, we investigate different ways to incorporate trust in location‐based routing schemes and we propose a novel way of balancing trust and location information. Computer simulations show that the proposed routing rule exhibits excellent performance in terms of delivery ratio, latency time and path optimality. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
19.
(R)evolution toward 4G mobile communication systems 总被引:1,自引:0,他引:1
20.
Theodore Zahariadis Panagiotis Trakadas Helen C. Leligou Sotiris Maniatis Panagiotis Karkazis 《Wireless Personal Communications》2013,69(2):805-826
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model. 相似文献