Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Sensor networks (2)
- Adjacent quadratic shortest path (1)
- Cell phones (1)
- Communications (1)
- Cyber physical systems (1)
-
- Distributed algorithm (1)
- Energy-efficient (1)
- Global positioning system (1)
- Graphs (1)
- Interference avoidance (1)
- Ionospher (1)
- Key generation (1)
- Key reconciliation (1)
- Multi-agent systems (1)
- Multicast (1)
- Network protocols (1)
- Physical layer security (1)
- Radio frequency (1)
- Reliability (1)
- SATCOM (1)
- Self-organization (1)
- Spectrum sharing (1)
- Stepping stone attack (1)
- Wide bandwidth (1)
- Wireless (1)
- Wireless communication system (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Virtual Satcom, Long Range Broadband Digital Communications, Dennis George Watson
Electrical & Computer Engineering Theses & Dissertations
The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed.
Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a …
A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra
A Multi-Agent Systems Approach For Analysis Of Stepping Stone Attacks, Marco Antonio Gamarra
Electrical & Computer Engineering Theses & Dissertations
Stepping stone attacks are one of the most sophisticated cyber-attacks, in which attackers make a chain of compromised hosts to reach a victim target. In this Dissertation, an analytic model with Multi-Agent systems approach has been proposed to analyze the propagation of stepping stones attacks in dynamic vulnerability graphs. Because the vulnerability configuration in a network is inherently dynamic, in this Dissertation a biased min-consensus technique for dynamic graphs with fixed and switching topology is proposed as a distributed technique to calculate the most vulnerable path for stepping stones attacks in dynamic vulnerability graphs. We use min-plus algebra to analyze …
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi
Electrical & Computer Engineering Theses & Dissertations
In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …
Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan
Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan
Computer Science Theses & Dissertations
Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …
Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu
Energy-Efficient Self-Organization Protocols For Sensor Networks, Qingwen Xu
Computer Science Theses & Dissertations
A Wireless Sensor Network (WSN, for short) consists of a large number of very small sensor devices deployed in an area of interest for gathering and delivery information. The fundamental goal of a WSN is to produce, over an extended period of time, global information from local data obtained by individual sensors. The WSN technology will have a significant impact on a wide array of applications on the efficiency of many civilian and military applications including combat field surveillance, intrusion detection, disaster management among many others. The basic management problem in the WSN is to balance the utility of the …
Atomic Broadcast In Heterogeneous Distributed Systems, Osman Zeineldine
Atomic Broadcast In Heterogeneous Distributed Systems, Osman Zeineldine
Computer Science Theses & Dissertations
Communication services have long been recognized as possessing a dominant effect on both performance and robustness of distributed systems. Distributed applications rely on a multitude of protocols for the support of these services. Of crucial importance are multicast protocols. Reliable multicast protocols enhance the efficiency and robustness of distributed systems. Numerous reliable multicast protocols have been proposed, each differing in the set of assumptions adopted, especially for the communication network. These assumptions make each protocol suitable for a specific environment. The presence of different distributed applications that run on different LANs and single distributed applications that span different LANs mandate …