In an industrial plant, there is usually a mix of devices with different levels of security features and computation capabilities. If a mix of devices with various degrees of security features and capabilities communicate, the overall network dynamics with respect to security and network performance will be complex. A secure communication path with high latency and low bandwidth may not satisfy the operational requirements in a plant. Therefore, there is a need to assess the relation of security and network performance for overall plant operation. In this work we focus on identifying an optimal flow path between two devices in a multi-hop heterogeneous network. We propose a model and an algorithm to estimate and generate a network path iden...
We investigate how to solve several classical network flow problems using secure multi-party computa...
This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneou...
In this paper, we first present a simple and effective path capacity predicting method to model the ...
In an industrial plant, there is usually a mix of devices with different levels of security features...
The severity of cyber threats towards existing and future industrial systems has resulted in an incr...
One of the main challenges in network management of large scale networks is the introduction of new ...
Abstract — We investigate a novel robust flow control framework for heterogeneous network access by ...
Abstract This work assesses the performance of secure machine-type communication networks composed ...
To run wireless nodes capable of data transmission over a wireless connection. Consequently, selecti...
In wireless mesh networks (WMNs), gateway nodes may become a severe bottleneck for Internet flows. I...
1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, esp...
Industrial Control Systems (ICS) and their networking infrastructure have been the target of an incr...
The number of connected devices are greater than the number of internet users, and is projected to c...
Computer networks of today consist of a multitude of devices, technologies and protocols that each i...
The field of machine-to-machine communications is filled with various proprietary protocols and devi...
We investigate how to solve several classical network flow problems using secure multi-party computa...
This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneou...
In this paper, we first present a simple and effective path capacity predicting method to model the ...
In an industrial plant, there is usually a mix of devices with different levels of security features...
The severity of cyber threats towards existing and future industrial systems has resulted in an incr...
One of the main challenges in network management of large scale networks is the introduction of new ...
Abstract — We investigate a novel robust flow control framework for heterogeneous network access by ...
Abstract This work assesses the performance of secure machine-type communication networks composed ...
To run wireless nodes capable of data transmission over a wireless connection. Consequently, selecti...
In wireless mesh networks (WMNs), gateway nodes may become a severe bottleneck for Internet flows. I...
1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, esp...
Industrial Control Systems (ICS) and their networking infrastructure have been the target of an incr...
The number of connected devices are greater than the number of internet users, and is projected to c...
Computer networks of today consist of a multitude of devices, technologies and protocols that each i...
The field of machine-to-machine communications is filled with various proprietary protocols and devi...
We investigate how to solve several classical network flow problems using secure multi-party computa...
This thesis concerns the security of tomorrow’s peer-to-peer real-time communication in heterogeneou...
In this paper, we first present a simple and effective path capacity predicting method to model the ...