Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi
UNLV Theses, Dissertations, Professional Papers, and Capstones
Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …
Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar
Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar
UNLV Theses, Dissertations, Professional Papers, and Capstones
Clustering a set of points in Euclidean space is a well-known problem having applications in pattern recognition, document image analysis, big-data analytics, and robotics. While there are a lot of research publications for clustering point objects, only a few articles have been reported for clustering a given distribution of obstacles. In this thesis we examine the development of efficient algorithms for clustering a given set of convex obstacles in the 2D plane. One of the methods presented in this work uses a Voronoi diagram to extract obstacle clusters. We also consider the implementation issues of point/obstacle clustering algorithms.