Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Performance of Wireless Networks (4)
- Directional Antennas (3)
- Wireless Networks (3)
- COLLECTOR (2)
- ELECTRICAL WITH SOLAR ENERGY (2)
-
- Eavesdropping (2)
- Feedback Control (2)
- SMART GRID (2)
- Security (2)
- Security of Wireless Networks (2)
- ASP (1)
- Active Server Pages (1)
- Ad Hoc Networks (1)
- Adaptive control (1)
- Android (1)
- Apache Web server (1)
- Bayesian Networks (1)
- Beamforming (1)
- Books (1)
- Channel allocation (1)
- Cognitive radio (1)
- Computer and Software (1)
- Connectivity (1)
- Content management system (1)
- Cyber Security (1)
- Cyber security (1)
- Directional antennas (1)
- Dynamic spectrum access (1)
- Exploits (1)
- Feedburner (1)
- Publication
- File Type
Articles 1 - 22 of 22
Full-Text Articles in Computer Engineering
How To Build An Rss Feed Using Asp, Umakant Mishra
How To Build An Rss Feed Using Asp, Umakant Mishra
Umakant Mishra
RSS is a XML based format. The Current popular version of RSS is RSS version 2.0. The purpose of adding an RSS feed to your site is to show if anything new is added to the site. For example, if a new article or blog or news item is added to your site that should automatically appear in the RSS feed so that the visitors/ RSS readers will automatically get updated about this new addition. The RSS feed is also called RSS channel.
There are two main elements of the RSS XML file, one is the header or channel element …
Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague
Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague
Patrick Tague
The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the …
Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague
Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague
Patrick Tague
Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational …
Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang
Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang
Patrick Tague
Location privacy has become one of the critical issues in the smartphone era. Since users carry their phones everywhere and all the time, leaking users’ location information can have dangerous implications. In this paper, we leverage the idea that Wi-Fi parameters not considered to be “sensitive” in the Android platform can be exploited to learn users’ location. Though the idea of using Wi-Fi information to breach location privacy is not new, we extend the basic idea and show that clever attackers can do so without being detected by current malware detection techniques. To achieve this goal, we develop the Unauthorized …
How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague
How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague
Patrick Tague
Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow this gap by analyzing the effect of a class of periodic jamming attacks on the attack detection metrics of packet delivery ratio (PDR) and received signal strength (RSS). We show that …
Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague
Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague
Patrick Tague
An attacker can launch an efficient jamming attack to deny service to flows in wireless networks by using cross-layer knowledge of the target network. For example, flow-jamming defined in existing work incorporates network layer information into the conventional jamming attack to maximize its attack efficiency. In this paper, we redefine a discrete optimization model of flow-jamming in multichannel wireless networks and provide metrics to evaluate the attack efficiency. We then propose the use of stochastic optimization techniques for flow-jamming attacks by using three stochastic search algorithms: iterative improvement, simulated annealing, and genetic algorithm. By integrating the algorithms into a simulation …
Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy
Adaptive Wireless Communications: Mimo Channels And Networks, Daniel Bliss, Siddhartan Govindasamy
Siddhartan Govindasamy
Adopting a balanced mix of theory, algorithms and practical design issues, this comprehensive volume explores cutting-edge applications in adaptive wireless communications and the implications these techniques have for future wireless network performance. Presenting practical concerns in the context of different strands from information theory, parameter estimation theory, array processing and wireless communication, the authors present a complete picture of the field. Topics covered include advanced multiple-antenna adaptive processing, ad hoc networking, MIMO, MAC protocols, space-time coding, cellular networks and cognitive radio, with the significance and effects of both internal and external interference a recurrent theme throughout. A broad, self-contained technical …
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Ole J Mengshoel
Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel
Adaptive Control Of Apache Web Server, Erik Reed, Abe Ishihara, Ole J. Mengshoel
Ole J Mengshoel
Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof
Wireless Transmission Network : A Imagine, Radhey Shyam Meena Engineer, Neeraj Kumar Garg Asst.Prof
Radhey Shyam Meena
World cannot be imagined without electrical power. Generally the power is transmitted through transmission networks. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronic devices capable of charging themselves without ever being plugged in freeing us from that final ubiquitous power wire. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non-radioactivemethods. In this paper …
Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague
Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague
Patrick Tague
In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE, the service …
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er., Deepa Sharma
Radhey Shyam Meena
Grid-connected solar PV dramatically changes the load profile of an electric utility customer. The expected widespread adoption of solar generation by customers on the distribution system poses significant challenges to system operators both in transient and steady state operation, from issues including voltage swings, sudden weather-induced changes in generation, and legacy protective devices designed with one-way power flow in mind
On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez
On Spectrum Probing In Cognitive Radio Networks: Does Randomization Matter, Chao Chen, Zesheng Chen, Todor Cooklev, Carlos Pomalaza-Ráez
Todor Cooklev
In cognitive radio networks, dynamic spectrumaccess is achieved by allowing secondary users (SUs) to probethe spectrum and utilize available channels opportunistically.Spectrum probing mechanisms should be efficient and fast toavoid harmful interference with primary users (PUs). Periodicprobing has been commonly adopted as a default spectrumprobing mechanism. In this paper, we attempt to study differentspectrum probing mechanisms and evaluate a performance metriccalled the probing delay, i.e., how quickly a probing mechanismcan detect a channel change. We find that randomization in theprobing strategy does affect the probing delay. Specifically, in theindependent sensing scenario, periodic probing indeed achievesthe smallest probing delay. In the cooperative …
Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague
Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague
Patrick Tague
Current hierarchical communication infrastructure in the smart grid is not robust for data collection from smart meters during outages. In this work, we propose a self-organizing multi-channel wireless communication framework to aid in data collection for smart grid health monitoring. We propose a two-stage bootstrapping process in which nodes first self-organize into local mesh clusters by flattening the provisioned hierarchy and then interconnect to provide mesh connectivity from the outage region to functioning regions of the grid. We propose to construct this mesh-of-meshes hierarchy using a cross-layer strategy that jointly considers medium access limitations and the asymmetric traffic flow that …
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.
Battery Energy Storage System In Solar Power Generation, Radhey Shyam Meena Er.
Radhey Shyam Meena
As solar photovoltaic power generation becomes more commonplace, the inherent intermittency of the solar resource poses one of the great challenges to those who would design and implement the next generation smart grid. Specifically, grid-tied solar power generation is a distributed resource whose output can change extremely rapidly, resulting in many issues for the distribution system operator with a large quantity of installed photovoltaic devices. Battery energy storage systems are increasingly being used to help integrate solar power into the grid. These systems are capable of absorbing and delivering both real and reactive power with sub-second response times. With these …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …
Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Connectivity Of Wireless Ad Hoc Networks: Impacts Of Antenna Models, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Hong-Ning Dai
This paper concerns the impact of various antenna models on the network connectivity of wireless ad hoc networks. Existing antenna models have their pros and cons in the accuracy reflecting realistic antennas and the computational complexity. We therefore propose a new directional antenna model called Approx-real to balance the accuracy against the complexity. We then run extensive simulations to compare the existing models and the Approx-real model in terms of the network connectivity. The study results show that the Approx-real model can better approximate the best accurate existing antenna models than other simplified antenna models, while introducing no high computational …
On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
On Busy-Tone Based Mac Protocol For Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Hong-Ning Dai
The application of directional antennas in wireless ad hoc networks offers numerous benefits, such as the extended communication range, the increased spatial reuse, the improved capacity and the suppressed interference. However, directional antennas can cause new location-dependent carrier sensing problems, such as new hidden terminal and deafness problems, which can severely degrade the network performance. Recently, a few schemes have been proposed to address these problems. However, most of these existing methods can only partially solve the hidden terminal and deafness problems. Some of them even bring significant performance overhead. In this paper, we propose a novel MAC protocol, in …
Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Hong-Ning Dai
The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omnidirectional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks …
An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
An Overview Of Using Directional Antennas In Wireless Networks, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Hong-Ning Dai
Compared with omni-directional antennas, directional antennas have many merits, such as lower interference, better spatial reuse, longer transmission range and the improved network capacity. Directional antennas enable numerous emerging outdoor and indoor applications, which have been addressed in many recent studies. Despite the advances in wireless networks with directional antennas (DAWNs), there are many research challenges in all layers of DAWNs. This paper presents a detailed study on recent advances and open research issues on DAWNs. Firstly, we briefly introduce the classification of directional antennas, antenna radiation patterns, antenna modes as well as the challenges in the physical layer of …
Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Channel Allocation In Wireless Networks With Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu
Hong-Ning Dai
In this paper, we study the channel allocation in multi-channel wireless ad hoc networks with directional antennas. In particular, we investigate the problem: given a set of wireless nodes equipped with directional antennas, how many channels are needed to ensure collision-free communications? We derive the upper bounds on the number of channels, which heavily depend on the node density and the interference ratio (i.e., the ratio of the interference range to the transmission range). We construct several scenarios to examine the tightness of the derived bounds. We also take the side-lobes and back-lobes as well as the signal path loss …
On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong
On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong
Hong-Ning Dai
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of …