KEYWORDS: Computer security, Remote sensing, Received signal strength, Data storage, Information security, Network security, Operating systems, Networks, Data communications, Internet
The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams
aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught
with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large
capability gaps between various organizational locations that need to work together, which has raised new challenges for
information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take
place. While integrating remote business locations with mainstream operations, one or more of the issues including the
lack of application level support, computational capabilities, communication limitations, and legal requirements cause a
serious impediment thereby complicating integration while not violating the organizations' security requirements. Often
resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This
paper addresses such security issues by introducing an intermediate server between corporate central server and remote
sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after
transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our
experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising
out of weak communication and/or computing links and is simple to implement.
Peer-to-Peer (P2P) networks have been used efficiently as building blocks as overlay networks for large-scale distributed
network applications with Internet Protocol (IP) based bottom layer networks. With large scale Wireless Sensor
Networks (WSNs) becoming increasingly realistic, it is important to overlay networks with WSNs in the bottom layer.
The suitable mathematical (stochastic) model that can model the overlay network over WSNs is Queuing Networks with
Multi-Class customers. In this paper, we discuss how these mathematical network models can be simulated using the
object oriented simulation package OMNeT++. We discuss the Graphical User Interface (GUI) which is developed to
accept the input parameter files and execute the simulation using this interface. We compare the simulation results with
analytical formulas available in the literature for these mathematical models.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.