Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

University of Massachusetts Amherst

Theses/Dissertations

Computer Networks

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula Oct 2021

Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula

Masters Theses

Connected systems are becoming more ingrained in our daily lives with the advent of cloud computing, the Internet of Things (IoT), and artificial intelligence. As technology progresses, we expect the number of networked systems to rise along with their complexity. As these systems become abstruse, it becomes paramount to understand their interactions and nuances. In particular, Mobile Ad hoc Networks (MANET) and swarm communication systems exhibit added complexity due to a multitude of environmental and physical conditions. Testing these types of systems is challenging and incurs high engineering and deployment costs. In this work, we propose a scalable MANET emulation …


Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani Mar 2019

Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani

Doctoral Dissertations

This dissertation focuses on covert communication in channels where the communication takes place by the transmission of packets. Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $\lambda$ packets per second for a time period $T$. Jack's transmitted packet visit Alice, Willie, Bob and Steve, respectively. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob without being detected by a watchful adversary Willie. We consider three sets of assumptions for this channel. For each set of assumptions, we present a technique for establishing covert communication …