Airehrour, David Gutierrez, J. Ray, S. K.
The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, is the ability of a user to evaluate its neighbour, or a recommended neighbour with the hope of being able to trust that user. I...
Kolahi, Samad Almatrook, A.A.
In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of IPv4 and IPv6 on average decreased by 16.79% and 10.22% respectively. Throughput for UDP is decreased by 18.07% and 12.99% for IP...
Kolahi, Samad Mudaliar, Keysha Zhang, C. Gu, Z.
In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput are almost same for both operating systems. CPU usage was higher on both operating systems with IPsec enabled and the results for...
Kolahi, Samad Cao, Yuqing (Rico) Chen, Hong
IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system under IEEE802.11n wireless network. Enabling IPSec security results on average approximately 50% less TCP throughout while enabling...
Airehrour, David Gutiérrez, J. Ray, S. K.
This paper presents a survey of current energy efficient technologies that could drive the IoT revolution while examining critical areas for energy improvements in IoT sensor nodes. The paper reviews improvements in emerging energy techniques which promise to revolutionize the IoT landscape. Moreover, the current work also studies the sources of en...
You, Li
The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible, exible, stable and to the utmost, decentralized network traffic analysis system. The core module of the system is a bunch of collaborative real-time analysis engines/agents capable ...
Kolahi, Samad Cao, Yuqing (Rico) Chen, Hong
Due to overheads of security algorithms used in IPSec, transferring data using IPSec is known to be significantly slow compared with open system. In this paper, we present new results on performance of IPSec using 7 encryption systems for both IPv4 and IPv6 using Windows 7 and wireless network access. For the system studied, enabling IPSec results ...
Kolahi, Samad Cao, Yuqing (Rico) Chen, Hong
IPSec (IP Security) is a robust technique for securing communications over the Internet. Due to security algorithms used, transferring data using IPSec is known to be significantly slow. In this paper using a test bed environment for a site to site IPSec, we present new results on performance of IPSec for both IPv4 and IPv6 using Fedora 15 operatin...
Kolahi, Samad Narayan, Shaneel Nguyen, Du D.T. Sunarto, Y. Mani, Paul
This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both TCP and UDP protocols. The parameters considered are throughput and response time. The results indicate that security mechanism d...
Rooney, David Hearn, Greg Ninan, Abraham
The central motivation for assembling the contributions in this Handbook on the Knowledge Economy derives from the observation that many in government and business seem to have taken up the challenge of putting in place whatever is needed for a knowledge-based economy or a knowledge-based organization but very few appear to be inclined to explain w...