message routing
Recently Published Documents


TOTAL DOCUMENTS

170
(FIVE YEARS 19)

H-INDEX

15
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Leonel Feitosa ◽  
Lucas Santos ◽  
Glauber Goncalves ◽  
Tuan Anh Nguyen ◽  
Jae-Woo Lee ◽  
...  

2021 ◽  
Author(s):  
Abdolkarim Hajfarajollah Dabbagh

"Due to the lack of a centralized server in “Peer-to-Peer” (P2P) networks, users are responsible for the security of these networks. One of the security issues in P2P networks is the security of the message routing. Messages could be altered or modified by attackers while being routed. The conventional security method to avoid this has been “Public Key Cryptography” (PKC). To avoid the certificate management issue in PKC, “Identity-based Encryption” (IBE) has been suggested in which any arbitrary string could be used as a public key. Since IBE is a computationally expensive method, current proposed IBE-based methods are not effective in the message routing phase in P2P networks and highly affect the performance of message delivery time in these networks. This thesis proposes two IBE-based protocols that can be applied effectively to the message routing phase of structured P2P networks, yet provide a satisfactory message delivery time performance. Both protocols benefit from Identity-based key exchange scheme and, therefore, none of them impose any extra communication on the network to secure message routing. Protocol 1 significantly improves the performance of message delivery time compared to the current IBE-based proposed methods. Protocol 2, which requires nodes to store data, has a performance similar to the situations in which no security measures are applied for message routing."


2021 ◽  
Author(s):  
Abdolkarim Hajfarajollah Dabbagh

"Due to the lack of a centralized server in “Peer-to-Peer” (P2P) networks, users are responsible for the security of these networks. One of the security issues in P2P networks is the security of the message routing. Messages could be altered or modified by attackers while being routed. The conventional security method to avoid this has been “Public Key Cryptography” (PKC). To avoid the certificate management issue in PKC, “Identity-based Encryption” (IBE) has been suggested in which any arbitrary string could be used as a public key. Since IBE is a computationally expensive method, current proposed IBE-based methods are not effective in the message routing phase in P2P networks and highly affect the performance of message delivery time in these networks. This thesis proposes two IBE-based protocols that can be applied effectively to the message routing phase of structured P2P networks, yet provide a satisfactory message delivery time performance. Both protocols benefit from Identity-based key exchange scheme and, therefore, none of them impose any extra communication on the network to secure message routing. Protocol 1 significantly improves the performance of message delivery time compared to the current IBE-based proposed methods. Protocol 2, which requires nodes to store data, has a performance similar to the situations in which no security measures are applied for message routing."


2021 ◽  
Author(s):  
Stephen Chui

Network-On-Chip (NoC) has surpassed the traditional bus based on-chip communication in offering better performance for data transfers among many processing, peripheral and other cores of high performance embedded systems. Adaptive routing provides an effective way of efficient on-chip communication among NoC cores. The message routing efficiency can further improve the performance of NoC based embedded systems on a chip. Congestion awareness has been applied to adaptive routing for achieving better data throughput and latency. This thesis presents a novel approach of analyzing congestion to improve NoC throughput by improving packet allocation in NoC routers. The routers would have the knowledge of the traffic conditions around themselves by utilizing the congestion information. We employ header flits to store the congestion information that does not require any additional communication links between the routers. By prioritizing data packets that are likely to suffer the worst congestion would improve overall NoC data transfer latency.


2021 ◽  
Author(s):  
Stephen Chui

Network-On-Chip (NoC) has surpassed the traditional bus based on-chip communication in offering better performance for data transfers among many processing, peripheral and other cores of high performance embedded systems. Adaptive routing provides an effective way of efficient on-chip communication among NoC cores. The message routing efficiency can further improve the performance of NoC based embedded systems on a chip. Congestion awareness has been applied to adaptive routing for achieving better data throughput and latency. This thesis presents a novel approach of analyzing congestion to improve NoC throughput by improving packet allocation in NoC routers. The routers would have the knowledge of the traffic conditions around themselves by utilizing the congestion information. We employ header flits to store the congestion information that does not require any additional communication links between the routers. By prioritizing data packets that are likely to suffer the worst congestion would improve overall NoC data transfer latency.


2021 ◽  
Vol 18 (4) ◽  
pp. 1186-1193
Author(s):  
J. N. V. R. Swarup Kumar ◽  
D. Suresh

The efficient message routing is highly challenging in terms of low power and lossy networks (loT) for transmission of data with overhead and delay. The protocols used for routing need to be designed such that they should be working efficiently. Efficiency in calculated in terms of energy and delivery of packets. RPL protocol is also designed with the aim of making these two parameters efficient. Even then it contains drawbacks. Trickle algorithm is designed with a goal to reduce the drawbacks in RPL. Trickle algorithm is used in RPL protocols for creation of routes between nodes in the network with different intervals. Unfortunately, there exists some more downsides for the trickle algorithm, which made design of several algorithms inorder to analyse different drawbacks. In this paper, on analysing different types of trickle algorithms and locating the drawback in every algorithm, a novel algorithm is designed which helps in reduction of the drawbacks that are found. The description of this algorithm along with the simulation results done using Cooja 3.0 simulator is also discussed in this paper. The Simulation of the algorithm that is newly designed is done by assuming a network with different count of nodes and comparing the results with the previously introduced Trickle algorithms.


Sign in / Sign up

Export Citation Format

Share Document