3,859 research outputs found

    The Egnatia Motorway and The Changes in Interregional Trade in Greece: An Ex Ante Assessment

    Get PDF
    The Egnatia Motorway, located in the northern part of Greece, constitutes one of the most important, as well as ambitious, projects of the Trans-European Transport Networks programme (TETN) funded by the European Commission. It is expected to greatly influence the spatial economic relationships of several regions across the country. The motorway crosses all administrative regions of Northern Greece, and the expectations currently sustained by the public as regards its contribution to regional development are exceptionally great. As numerous empirical studies have already shown, the most important changes in regional economy induced by interregional transportation infrastructure are associated with trade flows between different regions. This paper analyses the major determinants of interregional trade in Greece and estimates the changes in interregional trade flows which the construction of the Egnatia Motorway is capable of generating

    CoAP over ICN

    Full text link
    The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol for resource-oriented applications intended to run on constrained devices, typically part of the Internet of Things. In this paper we leverage Information-Centric Networking (ICN), deployed within the domain of a network provider that interconnects, in addition to other terminals, CoAP endpoints in order to provide enhanced CoAP services. We present various CoAP-specific communication scenarios and discuss how ICN can provide benefits to both network providers and CoAP applications, even though the latter are not aware of the existence of ICN. In particular, the use of ICN results in smaller state management complexity at CoAP endpoints, simpler implementation at CoAP endpoints, and less communication overhead in the network.Comment: Proc. of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus, November, 201

    Securing Information-Centric Networking without negating Middleboxes

    Full text link
    Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN. Nevertheless, most of these solutions relax security requirements in favor of network performance. In particular, they weaken end-user privacy and the architecture's tolerance to security breaches in order to support middleboxes that offer services such as caching and content replication. In this paper, we adapt TLS, a widely used security standard, to an ICN context. We design solutions that allow session reuse and migration among multiple stakeholders and we propose an extension that allows authorized middleboxes to lawfully and transparently intercept secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility & Security, IFIP, 201

    Blockchain-based Data Provenance for the Internet of Things

    Full text link
    As more and more applications and services depend on data collected and provided by Internet of Things (IoT) devices, it is of importance that such data can be trusted. Data provenance solutions together with blockchain technology are one way to make data more trustworthy. However, current solutions do not address the heterogeneous nature of IoT applications and their data. In this work, we identify functional and non-functional requirements for a generic IoT data provenance framework, and conceptualise the framework as a layered architecture. Using a proof-of-concept implementation based on Ethereum smart contracts, data provenance can be realised for a wide range of IoT use cases. Benefits of a generic framework include simplified adoption and a more rapid implementation of data provenance for the IoT
    corecore