Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Chaos (2)
- Noise (2)
- (GPS) (1)
- Antennas (1)
- Backdoors (1)
-
- Cloud security (1)
- Collision avoidance system (CAS) (1)
- Device model interfacing (1)
- Entropy (1)
- Interference (1)
- Microcontroller. (1)
- Mobile communication (1)
- Mobile handsets (1)
- Noise cancellation (1)
- One-time pad (1)
- One-time pads (1)
- One-to-Cloud (1)
- PSpice (1)
- Snowden (1)
- Time-frequency analysis (1)
- Transforms (1)
- Urban areas (1)
- Virtual prototyping (1)
- Von Neumann. (1)
- Wireless Sensor Networks (WSNs); Clustering Opportunistic Ant-based Routing; novel heuristic function; COAR protocol (1)
- Wireless communication system (1)
- Publication
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin
Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin
Conference papers
We present a tiled delay estimation technique in the context of Mobile Cloud Computing (MCC) environments. We examine its accuracy in the presence of multiple sources for (1) sub-sample delays and also (2) in the presence of phase-wrap around. Phase wrap-around is prevalent in MCC because the separation of acoustic sources may be large. We show that tiling a histogram of instantaneous phase estimates can improve delay estimates when phase-wrap around is sig- nificantly present and also when multiple sources are present. We report that error in the delay estimator is generally less than 5% of a sample, when the …
Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
Conference papers
Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators'' and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent …
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge
One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge
Conference papers
In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge
Conference papers
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …
Multi-Band Antenna Array Based On Double Negative Metamaterial For Multi Automotive Applications, Mohd Jamlos, Abdulrahman Alqadami,, Imtiaz Islam, Ping Soh, Rizalman Mamat, Khairil Khairi, Adam Narbudowicz
Multi-Band Antenna Array Based On Double Negative Metamaterial For Multi Automotive Applications, Mohd Jamlos, Abdulrahman Alqadami,, Imtiaz Islam, Ping Soh, Rizalman Mamat, Khairil Khairi, Adam Narbudowicz
Articles
Nowadays, the demand for antennas in wireless communication system for automotive applications is rising at a rapid rate [1, 2]. Their usage includes collision avoidance system (CAS), Vehicle-to-vehicle communications, pre-crash safety systems, Global Positioning Systems (GPS), tyre pressure monitoring system (TPMS), Wireless Local Area Network (WLAN), etc. To enhance its effectiveness in these new applications, a small, multi-band, multi-functional antenna is required instead of conventional single band antennas [2, 3]. Such multifunctional antennas with favourable radiation characteristics are more practical in addressing modern antenna design requirements. However, the achievement of the above mentioned antenna’s features using conventional materials and structures …
Clustering Opportunistic Ant-Based Routing Protocol For Wireless Sensor Networks, Xinlu Li, Brian Keegan, Fredrick Mtenzi
Clustering Opportunistic Ant-Based Routing Protocol For Wireless Sensor Networks, Xinlu Li, Brian Keegan, Fredrick Mtenzi
Conference papers
The wireless Sensor Networks (WSNs) have a wide range of applications in many ereas, including many kinds of uses such as environmental monitoring and chemical detection. Due to the restriction of energy supply, the improvement of routing performance is the major motivation in WSNs. We present a Clustering Opportunistic Ant-based Routing protocol (COAR), which comprises the following main contributions to achieve high energy efficient and well load-balance: (i) in the clustering algorithm, we caculate the theoretical value of energy dissipation, which will make the number of clusters fluctuate around the expected value, (ii) define novel heuristic function and pheromone update …