Explore chapters and articles related to this topic
Security Policy Management in Distributed SDN Environments
Published in Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody, Software-Defined Networking and Security, 2018
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
Choosing a decentralized control architecture is not trivial. There are several controller placement solutions, and factors such as the number of controllers, their location, and topology impact network performance [137]. Three major issues need to be elucidated [245] while determining the decentralization architecture: Efficient east- and westbound APIs need to be developed for communication between SDN controllers.The latency increase introduced due to network information exchange between the controllers needs to be kept to a minimum.The size and operation of the controller back-end database needs to be evaluated.
SIP Message Elements
Published in Radhika Ranjan Roy, Handbook on Session Initiation Protocol, 2018
The above properties can be met using the following algorithm, which is nonnormative. Implementers may chose to implement any algorithm of their choosing for generation of the temp-gruu-cookie, as long as it fulfills the five properties listed above. The registrar maintains a counter, I. This counter is 48 bits long and initialized to zero. This counter is persistently stored, using a back-end database or similar technique. When the registrar creates the first temporary GRUU for a particular SIP–PBX and instance ID (as defined by RFC 5627, see Section 4.3), the registrar notes the current value of the counter, I_i, and increments the counter in the database. The registrar then maps I_i to the contact and instance ID using the database, a persistent hash map, or similar technology. If the registration expires such that there are no longer any contacts with that particular instance ID bound to the GRUU, the registrar removes the mapping.
Lightweight Security Protocols for Blockchain Technology
Published in Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong, Cyber Defense Mechanisms, 2020
Jangirala Srinivas, Ashok Kumar Das
The “low-cost authentication protocol for the distributed database RFID system (HGLAP protocol)” [17] is targeted for the distributed database RFID system to provide a low-cost authentication. This protocol is considered efficient as it helps in minimizing the search time in the back-end database for a tag identity. A “challenge-response authentication protocol,” namely CRMAP protocol [40], relies on a “cryptographic collision-resistant hash function” and resists replay attack as well as spoofing attack. There are few more protocols that were intended either for “central trusted server” or “distributed database” using RFID systems [17,40].
Developing an RFID-based tracking system to improve the control of construction surplus soil disposal in Taiwan
Published in Journal of the Chinese Institute of Engineers, 2019
Rong-yau Huang, Tsung-Yi Tsai, Han-Hsiang Wang
Table 1 summarizes the applications and equipment requirements. Most applications and research have used ultrahigh frequency (UHF) and passive tags because they possess the advantages of reading at a proper range, having a lower cost, and being able to read multiple tags simultaneously. They are suitable for storing simple information and providing identification numbers for materials or equipment. The information on objects associated with the tag identification numbers is then stored in the back-end database server. Introducing Internet connectivity into the system is crucial for real-time RFID tracking applications and for irregular data manipulation to be prevented, as several studies have reported (Domdouzis, Kumar, and Anumba 2007; Wang 2008; Lin, Cheung, and Siao 2014). Furthermore, to ensure that the surplus soil is actually transported by a truck out of a construction jobsite and into a disposal site (instead of tracking an empty truck), cameras must be incorporated into the tracking system to photograph the truck. All of the aforementioned equipment and elements must be integrated into the proposed RFID-based tracking system to control the construction surplus soil disposal.
The impacts of cloud computing architecture on cloud service performance
Published in Journal of Computer Information Systems, 2020
The performance of a cloud service is application dependent. There are many enterprise applications running in the cloud today. Typically, the applications that have low dependencies or are less critical are moved to the cloud first. As such and oftentimes, web site is a good candidate to be moved to cloud first. In this study, we choose web service in the cloud as the application context to study the impacts of cloud architectures over the cloud performance with a simulated workload. The testing web sites with the back-end database were created on Cent OS virtual servers in cloud. PHP script language and PostgreSQL were used to develop the web page and the back-end database for their being open source systems and ease of use features.16
Exploring the RFID mutual authentication domain
Published in International Journal of Computers and Applications, 2021
Syed Muhammad Mohsin, Imran Ali Khan, Syed Muhammad Abrar Akber, Shahaboddin Shamshirband, Anthony T. Chronopoulos
Smart applications like smart education, smart e-healthcare system and intelligent transport system use embedded RFID tags. These tags produce data which is automatically transmitted to the reader and then to back-end database server. Authors of [53] state that automatic data transfer requires mutual authentication for safe data transfer. Various lightweight cryptographic solutions have been proposed by the research community. Authors of this study have proposed RFID-based authentication scheme for Internet of Things (IoT) applications. Results show that the proposed scheme outperformed previous authentication schemes.