data transfers
Recently Published Documents


TOTAL DOCUMENTS

407
(FIVE YEARS 94)

H-INDEX

22
(FIVE YEARS 4)

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 340
Author(s):  
Wen-Chung Tsai ◽  
Tzu-Hsuan Tsai ◽  
Te-Jen Wang ◽  
Mao-Lun Chiang

The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance security in lightweight machine-to-machine (M2M) communications, we propose a key update mechanism, namely, double OTP (D-OTP), which combines both one-time password (OTP) and one-time pad to achieve an IoT ecosystem with theoretically unbreakable security. The proposed D-OTP was implemented into the Constrained Application Protocol (CoAP) through the commonly used libcoap library. The experimental results revealed that an additional 8.93% latency overhead was required to obtain an unbreakable guarantee of data transfers in 100 CoAP communication sessions.


2021 ◽  
Vol 18 (4) ◽  
pp. 1-27
Author(s):  
Matthew Tomei ◽  
Shomit Das ◽  
Mohammad Seyedzadeh ◽  
Philip Bedoukian ◽  
Bradford Beckmann ◽  
...  

Cache-block compression is a highly effective technique for both reducing accesses to lower levels in the memory hierarchy (cache compression) and minimizing data transfers (link compression). While many effective cache-block compression algorithms have been proposed, the design of these algorithms is largely ad hoc and manual and relies on human recognition of patterns. In this article, we take an entirely different approach. We introduce a class of “byte-select” compression algorithms, as well as an automated methodology for generating compression algorithms in this class. We argue that, based on upper bounds within the class, the study of this class of byte-select algorithms has potential to yield algorithms with better performance than existing cache-block compression algorithms. The upper bound we establish on the compression ratio is 2X that of any existing algorithm. We then offer a generalized representation of a subset of byte-select compression algorithms and search through the resulting space guided by a set of training data traces. Using this automated process, we find efficient and effective algorithms for various hardware applications. We find that the resulting algorithms exploit novel patterns that can inform future algorithm designs. The generated byte-select algorithms are evaluated against a separate set of traces and evaluations show that Byte-Select has a 23% higher compression ratio on average. While no previous algorithm performs best for all our data sets which include CPU and GPU applications, our generated algorithms do. Using an automated hardware generator for these algorithms, we show that their decompression and compression latency is one and two cycles respectively, much lower than any existing algorithm with a competitive compression ratio.


2021 ◽  
Vol 4 (2) ◽  
pp. 37-47
Author(s):  
Marcelo Corrales Compagnucci ◽  
Mateo Aboy ◽  
Timo Minssen

 This article analyses the legal challenges of international data transfers resulting from the recent Court of Justice of the European Union (CJEU) decision in Case C-311/18 Data Protection Commissioner v Facebook Ireland Limited, Maximillian Schrems (Schrems II). This judgement invalidated the EU-US Privacy Shield Framework but upheld the use of standard contractual clauses (SCCs). However, one caveat is that organisations would have to perform a case-by-case assessment on the application of the SCCs and implement ‘supplementary measures’ to compensate for the lack of data protection in the third country, where necessary. Regrettably, the CJEU missed the opportunity to specify what exactly these ‘supplementary measures’ could be. To fill this gap, the European Data Protection Board (EDPB) adopted guidelines on the measures that supplement transfer tools to ensure compliance with the EU level of protection of personal data. In addition, on June 4th, 2021 the European Commission issued new SCCs which replaced the previous SCCs that were adopted under the previous Data Protection Directive 95/46. These new developments have raised the bar for data protection in international data transfers. In this article, we analyse the current regulatory framework for cross-border transfers of EU personal data and examine the practical considerations of the emerging post-Schrems II legal landscape. 


2021 ◽  
pp. 21-37
Author(s):  
Dan Jerker B. Svantesson

International data transfers are both essential for the modern world and a major source of risksto the protection of personal data. In this, we can speak of a clash between an important multifacetedobjective and the protection of a complex fundamental human right with implicationsgoing far beyond that right itself.The goal must be to facilitate data privacy respecting international data transfers. However,agreement on this goal – even if widespread – does not necessarily signal agreement on how wereach that goal. To make progress, we must proceed with caution and yet avoid getting boggeddown in the unavoidable challenges, such as definitional challenges, we will face.This article canvasses a selection of key considerations that ought to be kept in mind whenwe discuss approaches to international data transfers. However, to prepare ground for that discussion,it first sets the scene by examining the so-called Schrems II decision, its larger contextand background, as well as some of the reactions we have seen to that decision.


2021 ◽  
Author(s):  
Diana Dimitrova ◽  

In the report the new standard contractual clauses are analyzed, introduced with the Commission Implementing Decision 2021/914, and ensuring appropriate data protection safeguards in case of data transfers from the EU to third countries. Accent is put on the new moments. Based on the analysis and comparison with the previous standard contractual clauses summaries and conclusions are made.


2021 ◽  
Vol 4 (3) ◽  
pp. 30-38
Author(s):  
Basma A. Qasim ◽  
Emad H. Al-Hemiary

This paper aims to create infrastructure-free networking capabilities for people in need such as when inadequate infrastructure including mobile cell towers and power supplies are damaged or when all communication means are restricted. In general, this means finding a way to communicate without mobile cell towers, repeaters, or Wi-Fi hotspots on mobile devices. This paper focuses on introducing an ad-hoc network based on Bluetooth where users can communicate without barriers. The proposed network implementation uses Google’s API Nearby Connection which is one of Google Play Services that can provide high bandwidth, low latency, encrypted data transfers between nearby devices in a fully-offline P2P mode. Kotlin language was used to program an application called BlueEmergency installed on Android devices to broadcast data as bytes payloads in a form of text messages from one node to all nodes in proximity using Bluetooth only. The test and verification of the system are performed showed that successful communication is achieved with the latest versions of both the Android operating system and Bluetooth. Finally, the designed network can be extended to cover large geographical areas by multi-hopping the messages between devices to make the system more efficient to use in the time of need.


2021 ◽  
Author(s):  
Paolo Pazzaglia ◽  
Daniel Casini ◽  
Alessandro Biondi ◽  
Marco Di Natale

2021 ◽  
Author(s):  
Andrea Aza ◽  
David Melendi ◽  
Roberto García ◽  
Xabiel G. Pañeda ◽  
Laura Pozueco ◽  
...  

AbstractPrevious work has demonstrated the feasibility of Bluetooth Low Energy (BLE) as an alternative technology for data transfers in inter-vehicular communication (IVC) scenarios. Bluetooth 5.x core specifications enhance the trade-off between energy requirements, communication range and flexibility. In this paper, we aim to analyse the potential of Bluetooth 5 features for VANET applications, proposing a connectionless communication system. By means of field experiments, we evaluate long range and 2 × speed features, defining a set of communication scenarios. This allows us to test both Bluetooth 5.x range and application throughput. The evaluation includes experiments of V2I communications carried out under real highway traffic conditions. The experiments conducted demonstrate that communication ranges up to 300 m may be achieved depending on the communications scenario. The results also show how throughput degrades as the distance between devices increases. The results obtained are used to discuss future work, aimed at deeper analysing Bluetooth 5 features for VANET applications, completing the development of our prototype and evaluating VANET connectionless communications with the features included in the latest Bluetooth 5.2 specification.


Sign in / Sign up

Export Citation Format

Share Document