Learn More
The European Telecommunications Standards Institute (ETSI) is currently standardizing a new concept - namely Machine-to-Machine - that allows sensors and meters to communicate together with limited human intervention. One of the fundamental requirements of this new technology is to assure secure and self-organized communication over the existing network(More)
Video on demand (VoD) is a multimedia service which allows a remote user to select and then view video at his convenience at any time he wants. A VoD system is usually intended to provide VCR-like functions and capabilities. Required bandwidth and latency time, defined as user waiting time, are the most critical issues in VoD systems. While the majority of(More)
Video on demand (VoD) protocols is classified into two categories: proactive and reactive protocols. Proactive protocols are recommended to broadcast frequently requested (popular) movies. For less frequently requested (unpopular) videos reactive protocols perform much better in terms of bandwidth and hence are recommended. As the request frequency changes(More)
In this paper, we propose a secure and distributed public key infrastructure for vehicular ad hoc networks VANETs based on an hybrid trust model which is used to determine the trust metric (T<sub>m</sub>) of vehicles. The trust model consists on a monitoring system processing on two aspects: the cooperation of vehicles and the legitimacy of the broadcasted(More)
Power conservation techniques are of utmost importance in Wirreless LANs to prolong the life of mobile stations relying on portable limited enrgy batteries. A power conservation mechanism should provide the maximum energy saving at light traffic loads, yet thrives to deliver data as much as possible in high traffic conditions. In this paper, we investigate(More)
MIPv6 is the current IETF standard to manage IPv6 node mobility. While moving, TCP application may stop transferring data due to Internet disconnection. Due to TCP retransmission mechanisms, TCP applications are recovered as soon as problem is vanished. Nevertheless, TCP does not distinguish between losses due to network congestion and losses during end(More)
In this paper, we first propose a new and open architecture for mobile wireless nodes using multiple interfaces. This modular and flexible architecture aims to offer to industrial and research communities several possibilities to investigate and simulate multiple wireless protocol aspects, algorithms and issues. To validate our architecture and to show its(More)
In this paper, we focus on the detection of the Spam over Internet Telephony (SPIT) attacks targeting the Session Initiation Protocol (SIP) protocol during its signaling process. Though, a host of solutions have been proposed to detect and mitigate SPIT attacks in VoIP and SIP based systems, cooperation among local detection systems is so far neglected as a(More)
Many broadcasting protocols have been proposed for video-on-demand systems. The overwhelming majority of these protocols are, however, analytically evaluated or studied through simulations but virtually with no consideration to their feasibility and or ease of implementation in a real network environment. Efficient VoD protocols are usually the most complex(More)
  • 1