Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Engineering

On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang Oct 2014

On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang

Hong-Ning Dai

This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as …


Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba Oct 2014

Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba

Masoud Shakiba

The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant …


L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim Sep 2014

L2er: Low-Latency And Energy-Based Routing Protocol For Cognitive Radio Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Cognitive radio ad hoc networks (CRAHNs) are active, self-organized, and dynamic networks, in which cognitive users can communicate with each other in an ad hoc fashion. Various delay and energy-based routing protocols have been proposed for CRAHNs. However, these protocols do not consider the delay and node energy in the routing process, which can significantly affect performance. Delay and node energy are important factors in ad hoc networks in which devices have limited power. In this paper, we propose a new routing protocol, named low-latency and energy-based routing (L2ER) protocol; it considers both delay and energy for the routing decisions …


Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau Aug 2014

Sptf: Smart Photo-Tagging Framework On Smart Phones, Hao Xu, Hong-Ning Dai, Walter Hon-Wai Lau

Hong-Ning Dai

Smart phones, as one of the most important platforms for personal communications and mobile computing, have evolved with various embedded devices, such as cameras, Wi-Fi transceivers, Bluetooth transceivers and sensors. Specifically, the photos taken by a smart phone has the approximate or even equivalent image quality to that of a professional camera. As a result, smart phones have become the first choice for people to take photos to record their ordinary life. However, how to manage thousands of photos on a smart phone becomes a challenge. In this paper, we propose a new architecture in terms of Smart Photo-Tagging Framework …


End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith Aug 2014

End-To-End Latency Of A Fault-Tolerant Corba Infrastructure, Wenbing Zhao, Louise E. Moser, P. Michale Melliar-Smith

Wenbing Zhao

This paper presents an evaluation of the end-to-end latency of a fault-tolerant CORBA infrastructure that we have implemented. The fault-tolerant infrastructure replicates the server applications using active, passive and semi-active replication, and maintains strong replica consistency of the server replicas. By analyses and by measurements of the running fault-tolerant infrastructure, we characterize the end-to-end latency under fault-free conditions. The main determining factor of the run-time performance of the fault-tolerant infrastructure is the Totem group communication protocol, which contributes to the end-to-end latency primarily in two ways: the delay in sending messages and the processing cost of the rotating token. To …


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jun 2014

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Reza Vaezi

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao May 2014

Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao

Hong-Ning Dai

No abstract provided.


A Gradient-Based Optimum Block Adaptation Ica Technique For Interference Suppression In Highly Dynamic Communication Channels, Wasfy B. Mikhael, Tianyu Yang May 2014

A Gradient-Based Optimum Block Adaptation Ica Technique For Interference Suppression In Highly Dynamic Communication Channels, Wasfy B. Mikhael, Tianyu Yang

Thomas Yang

The fast fixed-point independent component analysis (ICA) algorithm has been widely used in various applications because of its fast convergence and superior performance. However, in a highly dynamic environment, real-time adaptation is necessary to track the variations of the mixing matrix. In this scenario, the gradient-based online learning algorithm performs better, but its convergence is slow, and depends on a proper choice of convergence factor. This paper develops a gradient-based optimum block adaptive ICA algorithm (OBA/ICA) that combines the advantages of the two algorithms. Simulation results for telecommunication applications indicate that the resulting performance is superior under time-varying conditions, which …


Introduction To Rfid Technology And Collision Problem, Masoud Shakiba May 2014

Introduction To Rfid Technology And Collision Problem, Masoud Shakiba

Masoud Shakiba

Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save …


Why Hybrid Mail Has Got The International Factor, Jacob Johnsen Jan 2014

Why Hybrid Mail Has Got The International Factor, Jacob Johnsen

Jacob Johnsen, MSc

Hybrid mail is instrumental to the development of international mail, as Jacob Johnsen explains in this article


Teaching Evaluation (Spring 2014), Hwee-Joo Kam Dec 2013

Teaching Evaluation (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang Dec 2013

Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang

Hong-Ning Dai

This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow fading environment. Most of previous studies have only concentrated on protecting the confidential communications at both the transmitters and the receivers and little attention has been paid on investigating the eavesdropping behaviors done by the malicious nodes. We therefore investigate the eavesdropping success rate of eavesdroppers equipped with various antenna models under various channels conditions, such as the path loss effect and the shadow fading effect. In particular, we formulate the eavesdropping attack problem with consideration of both simplistic directional antenna models and realistic antenna models. …


An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao Dec 2013

An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

This paper concerns the eavesdropping problem from the eavesdroppers’ perspective, which is new since most of previous studies only concentrate on the good nodes. We propose an analytical framework to investigate the eavesdropping attacks, taking account into various channel conditions and antenna models. Our extensive numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect and the antenna models; particularly, they imply that using directional antennas at eavesdroppers can increase the probability of eavesdropping attacks when the path loss effect is less notable. This study is helpful for us to …


Student Feedback (Spring 2014), Hwee-Joo Kam Dec 2013

Student Feedback (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.