Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey
Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey
Patrick Tague
Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …
Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague
Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague
Patrick Tague
The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility can have significant influence on the impact of a jamming attack. In this work, we investigate the use of mobility as a tool to allow both the adversarial network and the network under attack to reconfigure their geometry in an attempt to improve attack impact and protocol performance, respectively. We …
Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia
Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia
Sanaz Asadinia
No abstract provided.
A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad
A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad
Sanaz Asadinia
Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on …