Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp May 2023

Enabling Security Analysis And Education Of The Ethereum Platform: A Network Traffic Dissection Tool, Joshua Mason Kemp

Masters Theses, 2020-current

Ethereum, the decentralized global software platform powered by blockchain technology known for its native cryptocurrency, Ether (ETH), provides a technology stack for building apps, holding assets, transacting, and communicating without control by a central authority. At the core of Ethereum’s network is a suite of purpose-built protocols known as DEVP2P, which provides the underlying nodes in an Ethereum network the ability to discover, authenticate and communicate confidentiality. This document discusses the creation of a new Wireshark dissector for DEVP2P’s discovery protocols, DiscoveryV4 and DiscoveryV5, and a dissector for RLPx, an extensible TCP transport protocol for a range of Ethereum node …


Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter May 2019

Environmental Monitoring Using A Drone-Enabled Wireless Sensor Network, Gina Valentino, Laura Yates, Brooke Potter

Senior Honors Projects, 2010-2019

Water quality monitoring traditionally occurs via resource intensive field surveys, such as when a researcher manually collects data in a stream. Limiting factors such as time, money, and accessibility often result in less oversight of impaired water bodies, significantly threatening ecosystemic health and related ecosystem services. According to the United States Environmental Protection Agency, 84% of rivers and streams within the United States remain unassessed, resulting in significant lapses in available data. Such lapses prohibit efficient and effective monitoring, restoration, and conservation efforts throughout the United States. The objective of this project was to employ an unmanned aerial vehicle to …


Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava May 2016

Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava

Masters Theses, 2010-2019

With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …


Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari Apr 2016

Investigating Security Attacks On Wireless Sensor Networks (Wsns) Via An Iot Environmental Monitoring System, Mauricio Tellez Nava, Samy El-Tawab, M. Hossain Heydari

Showcase of Graduate Student Scholarship and Creative Activities

To demonstrate our work, we have implemented a secure temperature monitoring system that makes use of the IEEE 802.15.4 standard, AES-128 hardware encryption and TelosB sensor nodes. In our design, we consider one of the nodes to be a coordinator node, which plays the role of a central node that establishes network association requests, listens for incoming packets, decrypts the incoming packets and forwards any received packets to the monitoring device. Three other nodes act as end-devices, which play the role of collecting temperature measurements, encrypting the collected data and sending the encrypted packets to the coordinator node. A last …