Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Security (2)
- Smart Grid (2)
- 5G (1)
- 6G (1)
-
- AMI Networks (1)
- Analog Beamforming (1)
- Co-design (1)
- Cyber-physical system (1)
- Digital Beamforming (1)
- Gateway placement (1)
- Hardware security (1)
- Hybrid AMI network (1)
- IEEE 802.11s-based AMI network (1)
- Intrusion detection (1)
- LTE (1)
- Layered and cross layered protocol (1)
- Machine learning (1)
- Mobile networks (1)
- Multibeams (1)
- Network interoperability (1)
- Ns-3 (1)
- Online data cleaning: Data stream recovery: Mobile wireless sensor networks: Virtual sensor: Belief-based data cleaning: Sketch technique: Trajectory sensor data cleaning (1)
- Path error aware retransmission timeout (1)
- Piggybacking ARP (1)
- Smart meter data reporting strategy (1)
- Spanning tree (1)
- Testbed (1)
- Trajectory (1)
- USB (1)
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage
Algorithms And Circuits For Analog-Digital Hybrid Multibeam Arrays, Paboda Viduneth A. Beruwawela Pathiranage
FIU Electronic Theses and Dissertations
Fifth generation (5G) and beyond wireless communication systems will rely heavily on larger antenna arrays combined with beamforming to mitigate the high free-space path-loss that prevails in millimeter-wave (mmW) and above frequencies. Sharp beams that can support wide bandwidths are desired both at the transmitter and the receiver to leverage the glut of bandwidth available at these frequency bands. Further, multiple simultaneous sharp beams are imperative for such systems to exploit mmW/sub-THz wireless channels using multiple reflected paths simultaneously. Therefore, multibeam antenna arrays that can support wider bandwidths are a key enabler for 5G and beyond systems.
In general, N- …
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
A Hardware-Assisted Insider Threat Detection And Prevention Framework, Kyle W. Denney
FIU Electronic Theses and Dissertations
Today, the USB protocol is among the most widely used protocols. However, the mass-proliferation of USB has led to a threat vector wherein USB devices are assumed innocent, leaving computers open to an attack. Malicious USB devices can disguise themselves as benign devices to insert malicious commands to connected end devices. A rogue device appears benign to the average OS, requiring advanced detection schemes to identify malicious devices. However, using system-level hooks, advanced threats may subvert OS-reliant detection schemes. This thesis showcases USB-Watch, a hardware-based USB threat detection framework. The hardware can collect live USB traffic before the data can …
Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef
Co-Design Of Security Aware Power System Distribution Architecture As Cyber Physical System, Tarek Youssef
FIU Electronic Theses and Dissertations
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system.
In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security …
Development Of A Remotely Accessible Wireless Testbed For Performance Evaluation Of Ami Related Protocols, Utku Ozgur
Development Of A Remotely Accessible Wireless Testbed For Performance Evaluation Of Ami Related Protocols, Utku Ozgur
FIU Electronic Theses and Dissertations
Although smart meters are deployed in many countries, the data collection process from smart meters in Smart Grid (SG) still has some challenges related to consumer privacy that needs to be addressed. Referred to as Advanced Metering Infrastructure (AMI), the data collected and transmitted through the AMI can leak sensitive information about the consumers if it is sent as a plaintext.
While many solutions have been proposed in the past, the deployment of these solutions in real-life was not possible since the actual AMIs were not accessible to researchers. Therefore, a lot of solutions relied on simulations which may not …
Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro
Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro
FIU Electronic Theses and Dissertations
The transformation of the legacy electric grid to Smart Grid (SG) poses numerous challenges in the design and development of an efficient SG communications network. While there has been an increasing interest in identifying the SG communications network and possible SG applications, specific research challenges at the network protocol have not been elaborated yet. This dissertation revisited each layer of a TCP/IP protocol stack which basically was designed for a wired network and optimized their performance in IEEE 802.11s-based Advanced Metering Infrastructure (AMI) communications network against the following challenges: security and privacy, AMI data explosion, periodic simultaneous data reporting scheduling, …
Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet
Novel Online Data Cleaning Protocols For Data Streams In Trajectory, Wireless Sensor Networks, Sitthapon Pumpichet
FIU Electronic Theses and Dissertations
The promise of Wireless Sensor Networks (WSNs) is the autonomous collaboration of a collection of sensors to accomplish some specific goals which a single sensor cannot offer. Basically, sensor networking serves a range of applications by providing the raw data as fundamentals for further analyses and actions. The imprecision of the collected data could tremendously mislead the decision-making process of sensor-based applications, resulting in an ineffectiveness or failure of the application objectives. Due to inherent WSN characteristics normally spoiling the raw sensor readings, many research efforts attempt to improve the accuracy of the corrupted or “dirty” sensor data. The dirty …
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin
FIU Electronic Theses and Dissertations
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …