Volume 3 Number 2 September 2014

    
A Secured Approach to Protect SIP Signaling Message

Narendra M. Shekokar

https://doi.org/

Abstract In today’s era VoIP system is globally accepted and popular communication system because of its reach features. VoIP system uses two signalling protocol: H323 and SIP (Session Initiation Protocol). Out of these SIP is popular amongst VoIP subscriber because of its light weight nature, but SIP is vulnerable to various confidentiality threats because of its text nature and poor authentication. In this... Read More


Minimizing Information Asymmetry Interference in Multi-Radio Multi-Channel Wireless Mesh Networks (MRMC-WMNs)

Sadiq Shah, Arbab Waseem Abbas, Hameed Hussain, Gohar Rahman

https://doi.org/

Abstract Multi-radio Multi-channel (MRMC) Wireless Mesh Networks (WMNs) in recent years have become a preferred choice for end users as they are reliable and extend the network connectivity on the last mile. MRMC-WMNs have already been deployed at various places but still WMN faces link interference issues i.e Information Asymmetry (IA), Near Hidden (NH) and Far Hidden (FH) terminals. These interference issues... Read More


Chain Management for Fireworks Industry Based on RFID

Liang Wang1 , Wenbi Wang2

https://doi.org/

Abstract Security risks exist in fireworks production and storage and there have been many accidents in the past few years. The introduction of chain management for fireworks industry is currently a new exploration and it is the new development trend of this industry. Using environmental monitoring system and the indoor positioning and tracking system based on RFID technology for real-timely monitoring the... Read More