Security Protocols for IoT Access Networks

Author(s):  
Romeo Giuliano ◽  
Franco Mazzenga ◽  
Alessandro Neri ◽  
Anna Vegni
2020 ◽  
Vol E103.B (1) ◽  
pp. 71-78
Author(s):  
Tung Thanh VU ◽  
Duy Trong NGO ◽  
Minh N. DAO ◽  
Quang-Thang DUONG ◽  
Minoru OKADA ◽  
...  

2010 ◽  
Vol E93-C (7) ◽  
pp. 1180-1190 ◽  
Author(s):  
Hiroshi WATANABE ◽  
Noriyuki ARAKI ◽  
Hisashi FUJIMOTO

1996 ◽  
Vol 1 (1) ◽  
pp. 88-99
Author(s):  
Stephen A. Grzelak ◽  
Harrison Miles ◽  
Edward S. Szurkowski ◽  
William P. Weber

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Sangita Solanki ◽  
Raksha Upadhyay ◽  
Uma Rathore Bhatt

Cloud-integrated wireless optical broadband (CIW) access networks inheriting advantages of cloud computing, wireless and optical access networks have a broad prospect in the future. Due to failure of components like OLT level, ONU level, link or path failure and cloud component level in CIW, survivability is becoming one of the important issues. In this paper, we have presented cloud-integrated wireless-optical broadband access network with survivability using integer linear programming (ILP) model, to minimize the number of cloud components while providing maximum backup paths. Hence, we have proposed protection through cloud-integrated wireless router to available ONUs (PCIWRAO). So, evaluated the backup path computation. We have considered ONU level failure in which the affected traffic is transferred through wireless routers and cloud component to the available ONUs using Manhattan distance algorithm. Simulation results show different configurations for different number of routers and cloud components illustrating available backup path when ONU fails.


Sign in / Sign up

Export Citation Format

Share Document