-Multistate operations within a network result in high-dimensional, multivariate temporal data, and are useful for systems, which monitor access to network entities like resources, objects, etc. Efficient self organization of such multistate network operations stored in databases with respect to relationships amongst users or between a user and a data object is an important and a challenging problem. In this work, a layer is proposed where discovered relationship patterns amongst users are classified as clusters. This information along with attributes of involved users is used to monitor and extract existing and growing relationships. The correlation is used to help generate alerts in advance due to internal user-object interactions or collaboration of internal as well as external entities. Using an experimental setup, the evolving relationships are monitored, and clustered in the database.
Quantum cryptography, exclusively known as Quantum key distribution (QKD), has attracted a lot of attention in the recent years with the discovery that it can provide absolute secrecy for communications. We report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing in the fiber, and also using some wavelength protocols. The advantages are discussed in detail for demonstrating the experimental report in the way of feasibility for the proposed architecture.
Abstract-According to technical statistics, current TCP protocols with appro ximately 80% Internet applications run on perform very well on wired networks. However, due to the effects of long propagation delay, great band-width asymmetry, high sporadic Bit Error Rate (BER) and etc., TCP performance degrades obviously on the satellite communicat ion networks. To avoid the problems, TP-S, a novel transport control protocol, is introduced for satellite IP networks. Firstly, in order to increase the increment speed of Congestion Window (cwnd) at the beginning of data transmission, the traditional Slow Start strategy is rep laced by a new strategy, known as Super Start. Secondly, a new packet lost discriminated scheme based on IP packets alternately sending with different priority is used in the protocol to decouple congestion decision from errors. Th ird ly, bandwidth asymmetry problem is avoided by adopting Modified NACK (M-NA CK) in receiving ends, which is sent periodically. In addition, the sending strategy in routers is also modified along with other"s changes to support the protocol. Finally, the simu lation experiments show that the new protocol can not only significantly enhance throughput performance, but also reduce sharply bandwidth used in the reverse path as compared with traditional TCP protocols and those protocols, which are recently proposed for satellite IP networks.
The rapid advancement of pervasive computing, IoT and wearable systems, given rise to low-power internet-based systems in elimination of distance complications by application of Wireless Sensor Networks, which consists of sensor, server and Cloud servers to sense various environmental readings and monitor the condition based on the data. Due to the association of vital data, and transferring it over an insecure and public communication channel, there is a critical prerequisite for sensor authentication, data integrity and data privacy. In this context many researchers had proposed various schemes for user authentication and secure data transmission over Cloud server. In this paper we proposed a three-factor user authentication and key agreement protocol for cloud server and claimed that the proposed protocol is efficient, secure and lightweight. The experimental analysis shows that the proposed scheme is resistance to well-known cryptographic attacks. Though the proposed scheme resists major cryptographic attacks, after in-depth analysis, we demonstrate that the scheme overcome many security pitfalls such as failure to resist replay attack, known session-specific temporary information attack, and failure to resist stolen-verifier attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.