communications networks
Recently Published Documents


TOTAL DOCUMENTS

850
(FIVE YEARS 123)

H-INDEX

42
(FIVE YEARS 3)

Network ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 1-20
Author(s):  
Marjo Heikkilä ◽  
Jani Suomalainen ◽  
Ossi Saukko ◽  
Tero Kippola ◽  
Kalle Lähetkangas ◽  
...  

The need for high-quality communications networks is urgent in data-based farming. A particular challenge is how to achieve reliable, cost-efficient, secure, and broadband last-mile data transfer to enable agricultural machine control. The trialed ad hoc private communications networks built and interconnected with different alternative wireless technologies, including 4G, 5G, satellite and tactical networks, provide interesting practical solutions for connectivity. A remotely controlled tractor is exemplified as a use case of machine control in the demonstrated private communication network. This paper describes the results of a comparative technology analysis and a field trial in a realistic environment. The study includes the practical implementation of video monitoring and the optimization of the control channel for remote-controlled unmanned agricultural tractors. The findings from this study verify and consolidate the requirements for network technologies and for cybersecurity enablers. They highlight insights into the suitability of different wireless technologies for smart farming and tractor scenarios and identify potential paths for future research.


2021 ◽  
Vol 1 (4) ◽  
pp. 793-803
Author(s):  
Paul M. Simon ◽  
Scott Graham

Rarely are communications networks point-to-point. In most cases, transceiver relay stations exist between transmitter and receiver end-points. These relay stations, while essential for controlling cost and adding flexibility to network architectures, reduce the overall security of the respective network. In an effort to quantify that reduction, we extend the Quality of Secure Service (QoSS) model to these complex networks, specifically multi-hop networks. In this approach, the quantification of security is based upon probabilities that adversarial listeners and disruptors gain access to or manipulate transmitted data on one or more of these multi-hop channels. Message fragmentation and duplication across available channels provides a security performance trade-space, with its consequent QoSS. This work explores that trade-space and the corresponding QoSS model to describe it.


2021 ◽  
pp. 263-274
Author(s):  
Maksym Spiryagin ◽  
Stefano Bruni ◽  
Christopher Bosomworth ◽  
Peter Wolfs ◽  
Colin Cole

2021 ◽  
pp. 115-120
Author(s):  
S. КOKIZA ◽  
V. STEPANOV

The article is devoted to the analysis of regulatory and legal acts and normative documents of the EU on information interception in electronic communication networks in the context of preparation of technical regulations of the united system of technical means.


Author(s):  
Jeff Gagnon

This paper will present the theoretical frameworks, research questions, and preliminary findings from $2 , a new study of movements for spectrum sovereignty. This foundational overview is a preliminary step toward a multi-year, international survey and case-study based project that aims to convene a space for the advancement of decolonized internet and communications networks predicated on the production of relational knowledges and the promotion of international solidarities. Centering the materiality of cyberspace necessarily reveals the relationships between the internet and settler colonialism. Such an acknowledgement is foundational to a decolonialist ethical point of view from which I argue for an understanding of space as relational practice, as resource, and as source of identity. A genuinely decolonized cyberspace that promotes the independence of colonized peoples is one that is subject to Indigenous spatial practices including territorial claims and treaty rights and so is one that is recognized as existing within space in a material way.


2021 ◽  
Vol 1 (3) ◽  
pp. 496-518
Author(s):  
Diana L. Huete Trujillo ◽  
Antonio Ruiz-Martínez

Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis. The most famous anonymous communication network is Tor. This anonymous communication network provides some interesting features. Among them, we can mention that Tor can hide a user’s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server’s IP address, used mainly to provide anonymity to websites. THS is an important research field in Tor. However, there is a lack of reviews that sum up the main findings and research challenges. In this article, we present a systematic literature review that aims to offer a comprehensive overview of the research made on THS by presenting the state-of-the-art and the different research challenges to be addressed. This review has been developed from a selection of 57 articles and presents main findings and advances regarding Tor hidden services, limitations found, and future issues to be investigated.


Sign in / Sign up

Export Citation Format

Share Document