Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (39)

Search Parameters:
Keywords = local area network (LAN)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 7664 KB  
Article
Off-Cloud Anchor Sharing Framework for Multi-User and Multi-Platform Mixed Reality Applications
by Aida Vidal-Balea, Oscar Blanco-Novoa, Paula Fraga-Lamas and Tiago M. Fernández-Caramés
Appl. Sci. 2025, 15(13), 6959; https://doi.org/10.3390/app15136959 - 20 Jun 2025
Viewed by 634
Abstract
This article presents a novel off-cloud anchor sharing framework designed to enable seamless device interoperability for Mixed Reality (MR) multi-user and multi-platform applications. The proposed framework enables local storage and synchronization of spatial anchors, offering a robust and autonomous alternative for real-time collaborative [...] Read more.
This article presents a novel off-cloud anchor sharing framework designed to enable seamless device interoperability for Mixed Reality (MR) multi-user and multi-platform applications. The proposed framework enables local storage and synchronization of spatial anchors, offering a robust and autonomous alternative for real-time collaborative experiences. Such anchors are digital reference points tied to specific positions in the physical world that allow virtual content in MR applications to remain accurately aligned to the real environment, thus being an essential tool for building collaborative MR experiences. This anchor synchronization system takes advantage of the use of local anchor storage to optimize the sharing process and to exchange the anchors only when necessary. The framework integrates Unity, Mirror and Mixed Reality Toolkit (MRTK) to support seamless interoperability between Microsoft HoloLens 2 devices and desktop computers, with the addition of external IoT interaction. As a proof of concept, a collaborative multiplayer game was developed to illustrate the multi-platform and anchor sharing capabilities of the proposed system. The experiments were performed in Local Area Network (LAN) and Wide Area Network (WAN) environments, and they highlight the importance of efficient anchor management in large-scale MR environments and demonstrate the effectiveness of the system in handling anchor transmission across varying levels of spatial complexity. Specifically, the obtained results show that the developed framework is able to obtain anchor transmission times that start around 12.7 s for the tested LAN/WAN networks and for small anchor setups, and to roughly 86.02–87.18 s for complex physical scenarios where room-sized anchors are required. Full article
(This article belongs to the Special Issue Extended Reality (XR) and User Experience (UX) Technologies)
Show Figures

Figure 1

31 pages, 17989 KB  
Article
IoT-Cloud, VPN, and Digital Twin-Based Remote Monitoring and Control of a Multifunctional Robotic Cell in the Context of AI, Industry, and Education 4.0 and 5.0
by Adrian Filipescu, Georgian Simion, Dan Ionescu and Adriana Filipescu
Sensors 2024, 24(23), 7451; https://doi.org/10.3390/s24237451 - 22 Nov 2024
Cited by 3 | Viewed by 2745
Abstract
The monitoring and control of an assembly/disassembly/replacement (A/D/R) multifunctional robotic cell (MRC) with the ABB 120 Industrial Robotic Manipulator (IRM), based on IoT (Internet of Things)-cloud, VPN (Virtual Private Network), and digital twin (DT) technology, are presented in this paper. The approach integrates [...] Read more.
The monitoring and control of an assembly/disassembly/replacement (A/D/R) multifunctional robotic cell (MRC) with the ABB 120 Industrial Robotic Manipulator (IRM), based on IoT (Internet of Things)-cloud, VPN (Virtual Private Network), and digital twin (DT) technology, are presented in this paper. The approach integrates modern principles of smart manufacturing as outlined in Industry/Education 4.0 (automation, data exchange, smart systems, machine learning, and predictive maintenance) and Industry/Education 5.0 (human–robot collaboration, customization, robustness, and sustainability). Artificial intelligence (AI), based on machine learning (ML), enhances system flexibility, productivity, and user-centered collaboration. Several IoT edge devices are engaged, connected to local networks, LAN-Profinet, and LAN-Ethernet and to the Internet via WAN-Ethernet and OPC-UA, for remote and local processing and data acquisition. The system is connected to the Internet via Wireless Area Network (WAN) and allows remote control via the cloud and VPN. IoT dashboards, as human–machine interfaces (HMIs), SCADA (Supervisory Control and Data Acquisition), and OPC-UA (Open Platform Communication-Unified Architecture), facilitate remote monitoring and control of the MRC, as well as the planning and management of A/D/R tasks. The assignment, planning, and execution of A/D/R tasks were carried out using an augmented reality (AR) tool. Synchronized timed Petri nets (STPN) were used as a digital twin akin to a virtual reality (VR) representation of A/D/R MRC operations. This integration of advanced technology into a laboratory mechatronic system, where the devices are organized in a decentralized, multilevel architecture, creates a smart, flexible, and scalable environment that caters to both industrial applications and educational frameworks. Full article
(This article belongs to the Special Issue Intelligent Robotics Sensing Control System)
Show Figures

Figure 1

9 pages, 1187 KB  
Brief Report
Are Gamers Prone to eThrombosis during Long Gaming Sessions?
by Kasper B. Krarup, Henrik B. Krarup, Morten Mørk, Søren Lundbye-Christensen, Aase Handberg, Hien T. T. Nguyen, Inge S. Pedersen and Søren R. Kristensen
Life 2024, 14(4), 525; https://doi.org/10.3390/life14040525 - 18 Apr 2024
Viewed by 1807
Abstract
During the last two decades, several cases of venous thrombosis (VTE) after a prolonged period at a computer have been described, denominated as “eThrombosis”. Video gaming on a computer has become very popular and can be a social activity where several players gather [...] Read more.
During the last two decades, several cases of venous thrombosis (VTE) after a prolonged period at a computer have been described, denominated as “eThrombosis”. Video gaming on a computer has become very popular and can be a social activity where several players gather to play against each other or in a virtual environment for several days (“LAN (i.e., Local Area Network) parties”) where the participants are sedentary and consuming calorie-rich food items. The aim of this study was to investigate potential coagulation activation during a 42 h LAN party. Nine male gamers volunteered for the LAN party. Citrated blood was sampled before and every 6 h, and plasma was analyzed for thrombin generation, thrombin–antithrombin complexes (TAT), prothrombin fragment 1 + 2 (F1 + 2), and D-dimer. Thrombin generation increased slightly but not significantly during the LAN party, whereas the coagulation activation markers were unchanged. These results do not indicate that the coagulation system is activated significantly during 42 h of gaming with minimal physical activity. Although increased activity cannot be excluded, it does not directly indicate a risk of VTE in general. Full article
Show Figures

Figure 1

19 pages, 1901 KB  
Article
Enhancing LAN Failure Predictions with Decision Trees and SVMs: Methodology and Implementation
by Leila Rzayeva, Ali Myrzatay, Gulnara Abitova, Assiya Sarinova, Korlan Kulniyazova, Bilal Saoud and Ibraheem Shayea
Electronics 2023, 12(18), 3950; https://doi.org/10.3390/electronics12183950 - 19 Sep 2023
Cited by 8 | Viewed by 2702
Abstract
Predicting Local Area Network (LAN) equipment failure is of utmost importance to ensure the uninterrupted operation of modern communication networks. This study explores the use of machine learning algorithms to enhance the accuracy of equipment failure prediction in LAN environments. Using these algorithms [...] Read more.
Predicting Local Area Network (LAN) equipment failure is of utmost importance to ensure the uninterrupted operation of modern communication networks. This study explores the use of machine learning algorithms to enhance the accuracy of equipment failure prediction in LAN environments. Using these algorithms to enhance LAN failure predictions involves collecting and analyzing network data, such as packet loss rates and latency, to identify patterns and anomalies. These algorithms can then predict potential LAN failures by recognizing early warning signs and deviations from normal network behavior. By leveraging machine learning, network administrators can proactively address issues, reduce downtime, and improve overall network reliability. In our study, two powerful machine learning algorithms—decision tree and support vector machine (SVM)—are used. To evaluate the effectiveness of the proposed models, a comprehensive dataset comprising various LAN equipment parameters and corresponding failure instances is utilized. The dataset is pre-processed to handle missing values and normalize features, ensuring the algorithms’ optimal performance. Performance metrics, such as accuracy, precision, recall, and F1-score, are employed to assess the predictive capabilities of the models. The excremental results of our study lead to more reliable and stable network operations by allowing early detection of potential issues and preventive maintenance. This leads to reduced downtime, improved network performance, and enhanced overall user satisfaction. They demonstrate the efficacy of both decision tree and SVM algorithms in accurately predicting LAN equipment failure. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

23 pages, 510 KB  
Article
Analysis of a Collision-Affected M/GI/1/ /N Retrial Queuing System Considering Negative Customers and Transmission Errors
by Wei Xu, Liwei Liu, Linhong Li, Zhen Wang and Sabine Wittevrongel
Mathematics 2023, 11(16), 3532; https://doi.org/10.3390/math11163532 - 16 Aug 2023
Cited by 2 | Viewed by 1319
Abstract
This paper considers a retrial G-queue with collisions, transmission errors, and a finite number of sources, where service and repair time are both general distributions. The number of sources (terminals) is finite and a source cannot generate new requests until the channel (server) [...] Read more.
This paper considers a retrial G-queue with collisions, transmission errors, and a finite number of sources, where service and repair time are both general distributions. The number of sources (terminals) is finite and a source cannot generate new requests until the channel (server) finishes its work, i.e., the rate at which new primary requests are generated varies inversely with the number of data frame (customer) in the system. A collision occurs when service requests arrive at a busy channel, and transmission errors prevent data frames from leaving the system after completing service. Two types of arrivals are considered. Negative customers will break down the system in the busy state and remove the customer under service. The application of our model is indicated, with a particular emphasis on communication networks such as the local-area networks (LAN) with CSMA/CD protocol. Recursive formulas have been derived to calculate the stationary joint distributions and the Laplace transform of reliability function by applying the discrete transformations method along with the supplementary variables technique (SVT). Furthermore, the comparative performance and reliability analysis have been conducted numerically. Numerical examples are provided to investigate the sensitivity of different parameters on performance measures and reliability indicators. Full article
Show Figures

Figure 1

15 pages, 4226 KB  
Article
Research on Secure Storage Technology of Spatiotemporal Big Data Based on Blockchain
by Bao Zhou, Junsan Zhao, Guoping Chen and Ying Yin
Appl. Sci. 2023, 13(13), 7911; https://doi.org/10.3390/app13137911 - 6 Jul 2023
Cited by 2 | Viewed by 1722
Abstract
With the popularity of spatiotemporal big data applications, more and more sensitive data are generated by users, and the sharing and secure storage of spatiotemporal big data are faced with many challenges. In response to these challenges, the present paper puts forward a [...] Read more.
With the popularity of spatiotemporal big data applications, more and more sensitive data are generated by users, and the sharing and secure storage of spatiotemporal big data are faced with many challenges. In response to these challenges, the present paper puts forward a new technology called CSSoB (Classified Secure Storage Technology over Blockchain) that leverages blockchain technology to enable classified secure storage of spatiotemporal big data. This paper introduces a twofold approach to tackle challenges associated with spatiotemporal big data. First, the paper proposes a strategy to fragment and distribute space–time big data while enabling both encryption and nonencryption operations based on different data types. The sharing of sensitive data is enabled via smart contract technology. Second, CSSoB’s single-node storage performance was assessed under local and local area network (LAN) conditions, and results indicate that the read performance of CSSoB surpasses its write performance. In addition, read and write performance were observed to increase significantly as the file size increased. Finally, the transactions per second (TPS) of CSSoB and the Hadoop Distributed File System (HDFS) were compared under varying thread numbers. In particular, when the thread number was set to 100, CSSoB demonstrated a TPS improvement of 7.8% in comparison with HDFS. Given the remarkable performance of CSSoB, its adoption can not only enhance storage performance, but also improve storage security to a great extent. Moreover, the fragmentation processing technology employed in this study enables secure storage and rapid data querying while greatly improving spatiotemporal data processing capabilities. Full article
Show Figures

Figure 1

13 pages, 1732 KB  
Article
Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network
by Abdallah Elhigazi Abdallah, Mosab Hamdan, Mohammed S. M. Gismalla, Ashraf Osman Ibrahim, Nouf Saleh Aljurayban, Wamda Nagmeldin and Mutaz H. H. Khairi
Sensors 2023, 23(5), 2663; https://doi.org/10.3390/s23052663 - 28 Feb 2023
Cited by 7 | Viewed by 2724
Abstract
Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service [...] Read more.
Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service (DoS) attacks. In this study, management-frames-based DoS attacks, in which the attacker floods the network with management frames, are particularly concerning as they can cause widespread disruptions in the network. Attacks known as denial of service (DoS) can target wireless LANs. None of the wireless security mechanisms in use today contemplate defence against them. At the MAC layer, there are multiple vulnerabilities that can be exploited to launch DoS attacks. This paper focuses on designing and developing an artificial neural network (NN) scheme for detecting management-frames-based DoS attacks. The proposed scheme aims to effectively detect fake de-authentication/disassociation frames and improve network performance by avoiding communication interruption caused by such attacks. The proposed NN scheme leverages machine learning techniques to analyse patterns and features in the management frames exchanged between wireless devices. By training the NN, the system can learn to accurately detect potential DoS attacks. This approach offers a more sophisticated and effective solution to the problem of DoS attacks in wireless LANs and has the potential to significantly enhance the security and reliability of these networks. According to the experimental results, the proposed technique exhibits higher effectiveness in detection compared to existing methods, as evidenced by a significantly increased true positive rate and a decreased false positive rate. Full article
Show Figures

Figure 1

10 pages, 1421 KB  
Article
Adaptive Beam Splitting-Based Broadband Hybrid Precoding for Terahertz Massive MIMO
by Lei Xu, Yu Liu, Jing Chang, Hongyu Fang and Xiaohui Li
Sensors 2023, 23(4), 1968; https://doi.org/10.3390/s23041968 - 9 Feb 2023
Cited by 2 | Viewed by 2287
Abstract
Terahertz massive MIMO systems can be used in the local area network (LAN) scene of maritime communication and has great application prospects. To solve the problems of excessive beam training overhead in beam tracking and beam splitting in beam aggregation, a broadband hybrid [...] Read more.
Terahertz massive MIMO systems can be used in the local area network (LAN) scene of maritime communication and has great application prospects. To solve the problems of excessive beam training overhead in beam tracking and beam splitting in beam aggregation, a broadband hybrid precoding (HP) is proposed. First, an additional delayer is introduced between each phase shifter and the corresponding antenna in the classical sub-connected HP structure. Then, by precisely designing the time delay of the delayer and the phase shift of the phase shifter, broadband beams with flexible and controllable coverage can be generated. Finally, the simulation results verify that the proposed HP can achieve fast-tracking and high-energy-efficient communication for multiple mobile users. Full article
(This article belongs to the Special Issue Enabling Technologies for 6G Maritime Communications)
Show Figures

Figure 1

14 pages, 2327 KB  
Article
Performance Analysis of Raspberry Pi 3 IP PBX Based on Asterisk
by Bilal Muhammad Khan, Muhammad Fahad, Rabia Bilal and Ali Hanzala Khan
Electronics 2022, 11(20), 3313; https://doi.org/10.3390/electronics11203313 - 14 Oct 2022
Cited by 4 | Viewed by 3317
Abstract
IP-PBX have grown considerably in the telecoms and IT industries in recent times due to their low cost, high customizability, open source and hardware-independent nature. Unlike traditional PBX systems that are TDM-based and require a separate wired infrastructure to operate, an IP PBX [...] Read more.
IP-PBX have grown considerably in the telecoms and IT industries in recent times due to their low cost, high customizability, open source and hardware-independent nature. Unlike traditional PBX systems that are TDM-based and require a separate wired infrastructure to operate, an IP PBX can be attached to the local LAN and uses SIP with RTP over Internet Protocol (IP) for signaling and data transport, respectively. Asterisk-based IP PBX has become a de facto standard for open-source low-to-medium calling capacity requirements. Single Board Computers (SBCs) are attracting considerable attention from academics, hobbyists and the industry, due to their compact size, low cost, low power, portability and fair processing ability. Raspberry Pi series SBCs are the pioneer in the field, having Pi, Pi2, Pi3 and Pi Zero in production, supporting different processing and storage capabilities. An IP PBX embedded on the raspberry Pi SBC can serve an adequate number of users and provide a tiny platform that can fit in a pocket and be transported anywhere while preserving the functionality of a complete IP PBX. Such systems can be phenomenally successful in situations where large infrastructures cannot be taken, for instance, in warzones or disaster-affected areas where communication networks are damaged, necessitating an immediate requirement for an ad hoc-based communication system. In this paper, we aim to explore the performance of an Asterisk®-based IP PBX installed on a Raspberry Pi 3 (model B) platform in terms of concurrent call handling using different codecs. Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

9 pages, 1524 KB  
Communication
Eight-Channel LAN WDM (De)Multiplexer Based on Cascaded Mach–Zehnder Interferometer on SOI for 400GbE
by Zhizun Zhao, Zhen Li, Jiaqi Niu, Gaolu Zhang, Hongliang Chen, Xin Fu and Lin Yang
Photonics 2022, 9(4), 252; https://doi.org/10.3390/photonics9040252 - 11 Apr 2022
Cited by 21 | Viewed by 5862
Abstract
In this paper, we design and experimentally demonstrate an eight-channel cascaded Mach–Zehnder interferometer (MZI) based Local Area Network (LAN) Wavelength Division Multiplexing (WDM) (de)multiplexerwith channel spacing of 800 GHz on a silicon-on-insulator. By cascading a three-stage MZI, eight target wavelengths are (de)multiplexed. The [...] Read more.
In this paper, we design and experimentally demonstrate an eight-channel cascaded Mach–Zehnder interferometer (MZI) based Local Area Network (LAN) Wavelength Division Multiplexing (WDM) (de)multiplexerwith channel spacing of 800 GHz on a silicon-on-insulator. By cascading a three-stage MZI, eight target wavelengths are (de)multiplexed. The length difference of the third-stage MZI delay arms is adjusted so that the output channels skip the guard band. In order to keep the central wavelength of each channel from shifting, we utilize a wide waveguide for the phase delay arm in MZI to achieve large fabrication tolerance, and the multi-mode interference (MMI) couplers as power splitters with weak dispersions. The measurement results of the fabricated device show the precise wavelength alignment over the whole working wavelength range. Full article
Show Figures

Figure 1

24 pages, 4317 KB  
Article
Novel Record Replacement Algorithm and Architecture for QoS Management over Local Area Networks
by Yi-Chih Tung, Yuk-Wing Law, Wen-Jyi Hwang, Tsung-Ming Tai, Chih-Hsiang Ho and Cheng-Chang Chen
Micromachines 2022, 13(4), 594; https://doi.org/10.3390/mi13040594 - 10 Apr 2022
Viewed by 2191
Abstract
An effective System-on-Chip (SoC) for smart Quality-of-Service (QoS) management over a virtual local area network (LAN) is presented in this study. The SoC is implemented by field programmable gate array (FPGA) for accelerating the delivery quality prediction for a service. The quality prediction [...] Read more.
An effective System-on-Chip (SoC) for smart Quality-of-Service (QoS) management over a virtual local area network (LAN) is presented in this study. The SoC is implemented by field programmable gate array (FPGA) for accelerating the delivery quality prediction for a service. The quality prediction is carried out by the general regression neural network (GRNN) algorithm based on a time-varying profile consisting of the past delivery records of the service. A novel record replacement algorithm is presented to update the profile, so that the bandwidth usage of the service can be effectively tracked by GRNN. Experimental results show that the SoC provides self-aware QoS management with low computation costs for applications over virtual LAN. Full article
Show Figures

Figure 1

10 pages, 3989 KB  
Communication
Miniaturized Bandpass Filter Using a Combination of T–Shaped Folded SIR Short Loaded Stubs
by Kicheol Yoon, Kwang Gi Kim and Tae-Hyeon Lee
Sensors 2022, 22(7), 2708; https://doi.org/10.3390/s22072708 - 1 Apr 2022
Cited by 2 | Viewed by 2692
Abstract
The consumption of multimedia content is ubiquitous in modern society. This is made possible by wireless local area networks (W–LAN) or wire service systems. Bandpass filters (BPF) have become very popular as they solve certain data transmission limitations allowing users to obtain reliable [...] Read more.
The consumption of multimedia content is ubiquitous in modern society. This is made possible by wireless local area networks (W–LAN) or wire service systems. Bandpass filters (BPF) have become very popular as they solve certain data transmission limitations allowing users to obtain reliable access to their multimedia content. The BPFs with quarter–wavelength short stubs can achieve performance; however, these BPFs are bulky. In this article, we propose a compact BPF with a T–shaped stepped impedance resonator (SIR) transmission line and a folded SIR structure. The proposed BPF uses a T–shaped SIR connected to a J–inverter structure (transmission line); this T–shaped SIR structure is used to replace the λg/4 transmission line seen in conventional stub BPFs. In addition, a folded SIR is added to the short stubs seen in conventional stub BPFs. This approach allows us to significantly reduce the size of the BPF. The advantage of a BPF is its very small size, low insertion loss, and wide bandwidth. The overall size of the new BPF is 2.44 mm × 1.49 mm (0.068λg × 0.059λg). The proposed BPF can be mass produced using semiconductors due to its planar structure. This design has the potential to be widely used in various areas including military, medical, and industrial systems. Full article
(This article belongs to the Special Issue Antenna and Microwave Sensors)
Show Figures

Figure 1

21 pages, 17813 KB  
Article
Generalized Control of the Power Flow in Local Area Energy Networks
by Paolo Tenti and Tommaso Caldognetto
Energies 2022, 15(4), 1416; https://doi.org/10.3390/en15041416 - 15 Feb 2022
Cited by 4 | Viewed by 1923
Abstract
Local area energy networks (E-LANs) are cyber-physical systems whose physical layer is a meshed low-voltage microgrid fed by a multiplicity of sources, i.e., utilities, energy storage systems, and distributed power sources. The cyber layer includes distributed measurement, control, and communication units, located at [...] Read more.
Local area energy networks (E-LANs) are cyber-physical systems whose physical layer is a meshed low-voltage microgrid fed by a multiplicity of sources, i.e., utilities, energy storage systems, and distributed power sources. The cyber layer includes distributed measurement, control, and communication units, located at end-user premises, as well as centralized supervision and dispatchment control. As compared with standard microgrid, the E-LAN encompasses the ability for end-users to actively contribute to the operation of the microgrid while acting as independent energy traders in the electrical market. Operational goals include active contribution of end-users to power sharing, loss reduction, voltage stability, demand response, fault identification and clearing, isolation of sub-grids for maintenance, islanding, and black start. Economic goals include the possibility, for each end-user, to decide in every moment, based on convenience, how his energy and power capacity is shared with other users, e.g., for demand response or to trade energy in the electric market. This paper introduces a comprehensive theoretical approach of E-LAN control to achieve all the above operational goals while providing a high level of dynamic protection against faults or other events affecting the system functionality, e.g., overloads or fast transients. It shows that meshed microgrids are the necessary infrastructure to implement the desired functionalities. Full article
(This article belongs to the Special Issue Power System Dynamics and Renewable Energy Integration)
Show Figures

Figure 1

24 pages, 5115 KB  
Article
Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information
by Hyerin Kim and Jungmin So
Appl. Sci. 2021, 11(22), 11074; https://doi.org/10.3390/app112211074 - 22 Nov 2021
Cited by 7 | Viewed by 4116
Abstract
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA [...] Read more.
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA (Carrier-Sense Multiple Access)-based medium access control of current wireless network systems suffers from significantly degraded performance when the network becomes dense. Recent WLAN (Wireless Local Area Networks) standards include measures for increasing spatial reuse such as BSS (Basic Service Set) coloring, but the schemes based on BSS coloring such as OBSS/PD (Overlapping BSS/Preamble Detection) have limitations in improving spatial reuse. In this paper, we propose a spatial reuse method for uplink which can utilize BSS color and proximity information to improve the efficiency of carrier sensing and thus spatial reuse. Specifically, through the BSS color and the proximity information, a node receiving a preamble can figure out how far the receiver of the ongoing traffic is located. This information is used to determine whether the node should aggressively start transmitting or defer its transmission to protect the ongoing transmission. Simulation results show that the proposed method outperforms existing methods in terms of throughput and fairness. Full article
(This article belongs to the Special Issue Next-Generation Wireless Network Protocol Design)
Show Figures

Figure 1

18 pages, 2886 KB  
Article
Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
by Dan Tyler and Thiago Viana
Appl. Sci. 2021, 11(16), 7499; https://doi.org/10.3390/app11167499 - 16 Aug 2021
Cited by 26 | Viewed by 8556
Abstract
Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without [...] Read more.
Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even having to deal with the hardened perimeter. The zero-trust security model, created by John Kindervag in 2010, addresses the security flaws of the traditional perimeter model and asserts that all network traffic on the inside should not be trusted by default. Other core principles of zero trust include verification and continuous monitoring of all communication, as well as encryption of all data in transit and data at rest, since the goal of zero trust is to focus on protecting data. Although the zero-trust model was created in 2010, with some of the associated security practices existing even before that, many healthcare organisations are still choosing to focus primarily on securing the perimeter instead of focusing on the vulnerabilities within them. The current COVID-19 pandemic which healthcare providers are struggling with further highlights the need for improvements to security within the network perimeter, as many healthcare providers and vaccine developers are still using vulnerable, outdated legacy systems which could become compromised and indirectly have a detrimental effect on patient care. Legacy systems which are technologically limited, as well as medical devices which cannot be controlled or managed by network administrators, create boundaries to transitioning to a zero-trust architecture. It is challenges like this that have been explored during the research phase of this project in order to gain a better understanding of how a health organisation can adopt zero-trust practices despite the limitations of their current architecture. From the information gathered during this research, a framework was developed to allow a health organisation to transition to a more secure architecture based on the concept of zero-trust. Aspects of the proposed framework were tested in Cisco Modelling Labs (CML), and the results were evaluated to ensure the validity of some of the recommendations laid out in the framework. The main objective of this research was to prove that if a host within the local area network (LAN) were to be compromised, the damage would be limited to that host and would not spread throughout the rest of the network. This was successful after the qualitative research performed in CML. One of the other takeaways from testing the framework in CML was that medical devices could be secured by placing firewalls directly in front of them. This placement of firewalls may seem like an unorthodox approach and was shown to increase latency, but the blocking of all unnecessary traffic on the rest of the network will result in a performance boost and should balance it out in a real-world application. Full article
(This article belongs to the Special Issue Cyber Security in Human Health and Medical Devices)
Show Figures

Figure 1

Back to TopTop