Loading...
Search for: network-scalability
0.004 seconds

    Dynamic and secure key management model for hierarchical heterogeneous sensor networks

    , Article IET Information Security ; Volume 6, Issue 4 , 2012 , Pages 271-280 ; 17518709 (ISSN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    Many applications that utilise wireless sensor networks (WSNs) require essentially secure communication. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. Key management is the crucial important building block for all security goals in WSNs. Most existing researches tried to assign keys assuming homogeneous network architecture. Recently, a few key management models for heterogeneous WSNs have been proposed. In this study, the authors propose a dynamic key management framework based on elliptical curve cryptography and signcryption method for heterogeneous WSNs. The proposed scheme has network scalability and sensor node (SN)... 

    Scalable performance analysis of epidemic routing considering skewed location visiting preferences

    , Article 27th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2019, 22 October 2019 through 25 October 2019 ; Volume 2019-October , 2019 , Pages 201-213 ; 15267539 (ISSN); 9781728149509 (ISBN) Rashidi, L ; Dalili Yazdi, A ; Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    This paper investigates the performance of epidemic routing, in mobile social networks (MSNs), which makes use of the store-carry-forward paradigm for communication. Real-life mobility traces show that people have skewed location visiting preferences, with some places visited frequently and some others infrequently. In order to model epidemic routing in MSNs, we first analyze the time taken for a node to meet the first node belonging to a set of nodes restricted to move in a specific subarea. Afterwards, a monolithic stochastic reward net (SRN) is proposed to evaluate the delivery delay and the average number of transmissions under epidemic routing by considering skewed location visiting... 

    Exploitation of wavelength, hardware, and path redundancies in fault-tolerant all-optical DCNs

    , Article Optical Fiber Technology ; Volume 51 , 2019 , Pages 77-89 ; 10685200 (ISSN) Akbari Rokn Abadi, S ; Koohi, S ; Sharif University of Technology
    Academic Press Inc  2019
    Abstract
    Data center performance is affected by three main factors; bandwidth, latency, and reliability of intra-data center interconnection network. Bandwidth and latency are definitely improved by adopting optical technology for intra-data center communication, but fault tolerance of the corresponding optical networks has been raised less. Recently, we introduced two Torus-based, all-optical, and non-blocking networks, i.e. O-TF and O-FTF, addressing reliability of optical networks, and now, in this paper, to address the scalability problem, we propose a novel Optical Clos-based architecture which reduces minimum number of required wavelength channels, as well as, the switch size in each node.... 

    A secure key management framework for heterogeneous wireless sensor networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 October 2011 through 21 October 2011 ; Volume 7025 LNCS , October , 2011 , Pages 18-31 ; 03029743 (ISSN) ; 9783642247118 (ISBN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A Wireless sensor network (WSN) is composed of numerous sensor nodes with both insecurely limited hardware and restricted communication capabilities. Thus WSNs suffer from some inherent weaknesses. Key management is an interesting subject in WSNs because it is the fundamental element for all security operations. A few key management models for heterogeneous sensor networks have been proposed in recent years. In this paper, we propose a new key management scheme based on elliptic curve cryptography and signcryption method for hierarchical heterogeneous WSNs. Our scheme as a secure infrastructure has superior sensor node mobility and network scalability. Furthermore, we propose both a periodic... 

    Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks

    , Article Computer Networks ; Volume 200 , 2021 ; 13891286 (ISSN) Moosavi, R ; Parsaeefard, S ; Maddah Ali, M. A ; Shah-Mansouri, V ; Khalaj, B. H ; Bennis, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Network function virtualization (NFV) and software-defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time-consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this... 

    Semantic partitioning of peer-to-peer search space

    , Article Computer Communications ; Volume 32, Issue 4 , 2009 , Pages 619-633 ; 01403664 (ISSN) Rostami, H ; Habibi, J ; Livani, E ; Sharif University of Technology
    2009
    Abstract
    Peer-to-peer (P2P) networks are beginning to form the infrastructure of future applications. Computers are organized in P2P overlay networks to facilitate search queries with reasonable cost. So, scalability is a major aim in design of P2P networks. In this paper, to obtain a high factor of scalability, we partition network search space using a consistent static shared upper ontology. We name our approach semantic partition tree (SPT). All resources and queries are annotated using the upper ontology and queries are semantically routed in the overlay network. Also, each node indexes addresses of other nodes that possess contents expressible by the concept it maintains. So, our approach can be...