Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (10)
- Digital Communications and Networking (7)
- Computer Sciences (6)
- Physical Sciences and Mathematics (6)
- Electrical and Computer Engineering (5)
-
- Other Computer Engineering (2)
- Business (1)
- Civil and Environmental Engineering (1)
- Computer and Systems Architecture (1)
- Construction Engineering and Management (1)
- Data Storage Systems (1)
- E-Commerce (1)
- Education (1)
- Electrical and Electronics (1)
- Forensic Science and Technology (1)
- Information Security (1)
- Law (1)
- Legal Remedies (1)
- Legal Studies (1)
- OS and Networks (1)
- Other Computer Sciences (1)
- Power and Energy (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems and Communications (1)
- Technology and Innovation (1)
- Theory and Algorithms (1)
- Institution
- Publication
-
- Theses and Dissertations (3)
- Electronic Thesis and Dissertation Repository (2)
- Browse all Theses and Dissertations (1)
- Chancellor’s Honors Program Projects (1)
- Construction Management (1)
-
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- Master of Science in Software Engineering Theses (1)
- Student Theses (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
Articles 1 - 15 of 15
Full-Text Articles in Engineering
Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li
Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li
Electronic Thesis and Dissertation Repository
IoT networks have already been widely deployed due to their convenience and low-cost advantage. However, due to the lack of strong self-protection mechanisms and the imperfect network architectures, many IoT devices are vulnerable to malicious cyber-attacks, which will further threaten the availability and security of IoT applications. Therefore, securing the network infrastructure while protecting data from malicious or unauthorized devices/users become a vital aspect of IoT network design. In the thesis, two types of IoT security mechanisms are mainly investigated, namely, IoT routing protection and smart community device authentication.
By adopting the distributed consensus mechanism, we propose a blockchain-based reputation …
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee
Doctoral Dissertations
Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …
Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh
Enhanced Multimedia Exchanges Over The Internet, Fuad Shamieh
Electronic Thesis and Dissertation Repository
Although the Internet was not originally designed for exchanging multimedia streams, consumers heavily depend on it for audiovisual data delivery. The intermittent nature of multimedia traffic, the unguaranteed underlying communication infrastructure, and dynamic user behavior collectively result in the degradation of Quality-of-Service (QoS) and Quality-of-Experience (QoE) perceived by end-users. Consequently, the volume of signalling messages is inevitably increased to compensate for the degradation of the desired service qualities. Improved multimedia services could leverage adaptive streaming as well as blockchain-based solutions to enhance media-rich experiences over the Internet at the cost of increased signalling volume. Many recent studies in the literature …
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Student Theses
In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …
Vehicle Information System Using Blockchain, Amey Zulkanthiwar
Vehicle Information System Using Blockchain, Amey Zulkanthiwar
Electronic Theses, Projects, and Dissertations
The main purpose of a vehicle information system using blockchain is to create a transparent and reliable information system which will help consumers buy a vehicle; it is a vehicle information system. The blockchain system will create a time sequence chain of events database for each vehicle from the original sale. It will include insurance, vehicle repair, and vehicle resale. This project is mainly divided into three parts. Part one is used by the administration who will create the blockchain and will give authentication to a different organization to create the blockchain. Part two will be used by the Organization …
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill
Chancellor’s Honors Program Projects
No abstract provided.
Analysis Of Bitcoin Cryptocurrency And Its Mining Techniques, Suman Ghimire
Analysis Of Bitcoin Cryptocurrency And Its Mining Techniques, Suman Ghimire
UNLV Theses, Dissertations, Professional Papers, and Capstones
Bitcoin is a peer-to-peer digital, decentralized cryptocurrency created by an individual under pseudonym Satoshi Nakamoto. In fact, it is the first digital, decentralized currency. Several developers and organizations have explored the importance of digital cryptocurrency and the concept of the blockchain. Bitcoin is assumed to be one of the secure and comfortable payment methods that can be used in the upcoming days. The backbone of Bitcoin mining is the concept of the blockchain, which is assumed to beone of the ingenious invention of this century. The blockchain is the collection of blocks that are linked together in such a way …
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .
Master of Science in Software Engineering Theses
In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large scalable …
Modeling A Consortium-Based Distributed Ledger Network With Applications For Intelligent Transportation Infrastructure, Luis A. Cintron
Modeling A Consortium-Based Distributed Ledger Network With Applications For Intelligent Transportation Infrastructure, Luis A. Cintron
Theses and Dissertations
Emerging distributed-ledger networks are changing the landscape for environments of low trust among participating entities. Implementing such technologies in transportation infrastructure communications and operations would enable, in a secure fashion, decentralized collaboration among entities who do not fully trust each other. This work models a transportation records and events data collection system enabled by a Hyperledger Fabric blockchain network and simulated using a transportation environment modeling tool. A distributed vehicle records management use case is shown with the capability to detect and prevent unauthorized vehicle odometer tampering. Another use case studied is that of vehicular data collected during the event …
Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz
Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz
Theses and Dissertations
Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace Internet of Things (IoT) devices. ZigBee Physical Layer (PHY) is based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 specification designed to provide a low-cost, low-power, and low-complexity solution for Wireless Sensor Network(s) (WSN). The standard’s extended battery life and reliability makes ZigBee WSN a popular choice for home automation, transportation, traffic management, Industrial Control Systems (ICS), and cyber-physical systems. As robust and versatile as the standard is, ZigBee remains vulnerable to a myriad of common network attacks. Previous research involving Radio Frequency-Distinct Native Attribute …
A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby
A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby
Theses and Dissertations
Internet of Things devices are highly susceptible to attack, and owners often fail to realize they have been compromised. This thesis describes an anomalous-based intrusion detection system that operates directly on Internet of Things devices utilizing a custom-built Blockchain. In this approach, an agent on each node compares the node's behavior to that of its peers, generating an alert if they are behaving differently. An experiment is conducted to determine the effectiveness at detecting malware. Three different code samples simulating common malware are deployed against a testbed of 12 Raspberry Pi devices. Increasing numbers are infected until two-thirds of the …
Small-Scale Microgrid Energy Market Based On Pilt-Dao, Tianlu Gao
Small-Scale Microgrid Energy Market Based On Pilt-Dao, Tianlu Gao
Electronic Theses and Dissertations
With the installed capacities of Distributed Generations (DGs) dramatically increasing in power systems from Distributed Energy Resources (DERs) such as hydropower, wind, solar, geothermal and biomass, the operation methods of DERs tradings or transactions become more and more complicated. However, the energy market of DERs in Microgrids (MGs) is still under devolvement due to low security and transparency at present. Therefore, a small-scale microgrid energy market is proposed in this study based on Decentralized Autonomous Organization of Parallel, Integrity, Longevity, and Transparency (PILT-DAO) of the features of the blockchain. The microgrid owners can complete the transaction in the PILT-DAO market. …
Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem
Autonomous Spectrum Enforcement : A Blockchain Approach, Maqsood Ahamed Abdul Careem
Legacy Theses & Dissertations (2009 - 2024)
A core limitation in existing wireless technologies is the scarcity of spectrum, to support the exponential increase in Internet-connected and multimedia-capable mobile devices and the increasing demand for bandwidth-intensive services. As a solution, Dynamic Spectrum Access policies are being ratified to promote spectrum sharing for various spectrum bands and to improve the spectrum utilization. This poses an equally challenging problem of enforcing these spectrum policies. The distributed and dynamic nature of policy violations necessitates the use of autonomous agents to implement efficient and agile enforcement systems. The design of such a fully autonomous enforcement system is complicated due to the …
Implementation Of Blockchain Technology In The Construction Industry, Steven Graham
Implementation Of Blockchain Technology In The Construction Industry, Steven Graham
Construction Management
In general, the construction industry has been pretty resistant to change. While most industries have gained in productivity over the years through implementation of new technologies and other factors, construction industry productivity has been on a steady decline since the 1960s. Even though there are a multitude of reasons for this, including more complex building types and a decline in the workforce, the major problem holding construction back are project management issues and alienation of project stakeholders in the construction process. Some improvements have been made to help with collaboration between parties, like BIM (building information modeling) and project management …
Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku
Leveraging Blockchain To Mitigate The Risk Of Counterfeit Microelectronics In Its Supply Chain, Aman Ali Pogaku
Browse all Theses and Dissertations
System on Chip (SoC) is the backbone component of the electronics industry nowadays. ASIC and FPGA-based SoCs are the two most popular methods of manufacturing SoCs. However, both ASIC and FPGA industries are plagued with risks of counterfeits due to the limitations in Security, Accountability, Complexity, and Governance of their supply chain management. As a result, the current practices of these microelectronics supply chain suffer from performance and efficiency bottlenecks. In this research, we are incorporating blockchain technology into the FPGA and ASIC microelectronic supply chain to help mitigate the risk of counterfeit microelectronics through a secure and decentralized solution …