Impacts of mobility on telecommunication and data communication networks

1995 ◽  
Vol 2 (5) ◽  
pp. 20-33 ◽  
Author(s):  
O. Spaniol ◽  
A. Fasbender ◽  
S. Hoff ◽  
J. Kaltwasser ◽  
J. Kassubek
2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


2014 ◽  
Vol 513-517 ◽  
pp. 772-776
Author(s):  
Chen Wang ◽  
Hong Ai ◽  
Lie Wu ◽  
Yun Yang

The smart grid that the next-generation electric power system is studied intensively as a promising solution for energy crisis. One important feature of the smart grid is the integration of high-speed, reliable and secure data communication networks to manage the complex power systems effectively and intelligently. The goal of smart grid is to achieve the security of operation, economic efficient and environmental friendly. To achieve this goal, we proposed a fine-grained access control model for smart grid. In order to improve the security of smart grid, an access-trust-degree algorithm is proposed to evaluate the reliability of the user who want to access to the smart grid.


2012 ◽  
pp. 1852-1867
Author(s):  
Krassie Petrova ◽  
Raymond Yiwen Huang

The mobile Internet is a fast-growing technology that provides access to the traditional stationary (fixed-line) Internet from devices connected to mobile communication networks. It is predicted that the convergence between mobile networks and the fixed-line Internet will be a core feature in the next generation network architecture, achieving fast ‘anywhere’ Internet access and global mobility management. Applying a case study approach, this paper reviews the New Zealand mobile Internet market mix, competition, and mobile service provision. The key mobile Internet deployment requirements are determined and analyzed in order to identify a set of mobile Internet critical success factors and to investigate the impact of the shift from fixed-line to mobile and wireless Internet data communication infrastructure.


Author(s):  
Sathya Rao ◽  
Eric Mannie-Corbisier ◽  
Leszek Siwik

The way of life has changed with the introduction of information and communication technologies (ICT) in every one’s day to day activities and the business. As ICT technologies are constantly evolving, many people attribute the success of enterprises to the ways they deploy and take advantage of new technologies, not only to make their operations more efficient but most importantly to refine and adopt new effective and adaptive business models. Since the advent of the Internet and the very first Internet service providers (ISP) in operation, the traditional ISP market has been in constant evolution due to the gradual globalisation and commoditisation of ISP services. Deregulation and ICT policies have fostered competition (e.g., unbundling of the local loop and so forth) as well. The Internet is as an important channel of interaction inside and/or outside enterprises. The essence of the Internet is conducting business and running of business processes over data communication networks based on nonproprietary standards (Porter, 2001). The World Wide Web as a portal represents a major electronic business (e-business) platform accessed through communication channels provisioned by network and service providers (such as ISDN, DSL, WLAN, UMTS, etc.). There are many challenging aspects of the e-Business that must be considered for a sustainable business of an ISP (Petrie et al., 2004).


Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Peik Astrom

Network security is defined as “a set of procedures, practices and technologies for protecting network servers, network users and their surrounding organizations” (Oppliger, 2000, Preface). The need for network security is caused by the introduction of distributed systems, networks, and facilities for data communication. Improved network security is required because of the rapid development of communication networks. Network security is achieved by using software based tools, that is, network security software (Pulkkis, Grahn & Åström, 2003).


2019 ◽  
Vol 280 ◽  
pp. 05022
Author(s):  
Husnul Khatimi ◽  
Eka Setya Wijaya ◽  
Andreyan Rizky Baskara ◽  
Yuslena Sari

Copper wire cable and fiber optic cable are two communication media that are widely used in building data communication networks in today’s modern era. For network administrators, choosing the right type of cable to build a network is a must. Air temperature is one of the external factors that can affect the performance of network equipment. This paper provides a comparative analysis of the differences in performance between the use of fiber optic cables and copper wire cables which are capable of transferring data of 1 Gigabit per second. Performance measurement analysis includes the ability to transfer data from both media such as latency, throughput, and packet loss. For testing latency and throughput is done by sending as many as 65,000 data 30 times for each media. Whereas for packet loss testing is done by sending 10,000 data within 1 minute using test bandwidth on the Mikrotik router. From the test results, it can be seen that there is an effect of temperature changes on the performance of copper wire cable and fiber optic cable. The higher the air temperature, the packet loss, and latency will increase. As for the throughput value, the temperature only affects the throughput value on fiber optic cable and does not affect throughput on the copper wire cable.


Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 370 ◽  
Author(s):  
Shaik Farooq ◽  
S. Hussain ◽  
Siddavaram Kiran ◽  
Taha Ustun

Smart grids are becoming increasingly popular thanks to their ability to operate with higher precision and smaller margins. Dynamic operation control in smart grids can be achieved with phasor measurement unit (PMU) based wide area monitoring and control systems. The data communication requirements for the PMU based applications are well addressed in the IEEE C37.118.2 and IEC 61850-90-5 standards. Due to the higher probability of cyberattacks and the scale of their impact, data security is a critical requirement in PMU communication networks. The IEC 61850-90-5 communication standard addresses this security concern and proposes the HMAC (hash based message authentication code) with key distribution center (KDC) scheme for achieving information authentication and integrity. However, these IEC 61850-90-5 security recommendations do not consider the mechanism for attacks such as man-in-the-middle (MITM) attacks during KDC key exchanges. MITM attacks can be easily implemented and may have a large impact on the grid operation. This paper proposed an explicit certificate-based authentication mechanism to mitigate MITM attacks in PMU communication networks. The proposed certificate-based authentication mechanisms were implemented in real-time using Python-based terminals to observe their performance with different signature algorithms.


Sign in / Sign up

Export Citation Format

Share Document