Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey Nov 2010

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey

Patrick Tague

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague Oct 2010

Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague

Patrick Tague

The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility can have significant influence on the impact of a jamming attack. In this work, we investigate the use of mobility as a tool to allow both the adversarial network and the network under attack to reconfigure their geometry in an attempt to improve attack impact and protocol performance, respectively. We …


Disaster Recovery And Business Continuity Planning: Business Justification, Heather Brotherton Jun 2010

Disaster Recovery And Business Continuity Planning: Business Justification, Heather Brotherton

Heather M Brotherton

The purpose of this article is to establish the need for disaster recovery and business continuity planning for information systems. Today’s infrastructure and economic dependence upon information technology is highlighted as a basis for the requirement of disaster recovery and business continuity planning. This planning is stressed as a basic business requirement for any reputable information systems operation. The unique needs of information systems as well as the general background for the subject of disaster recovery and business continuity planning considerations are discussed. Contingency contracts, failover locations, and testing are recommended along with communication protocols. DOI:10.5055/jem.2010.0019


Control System Performance And Efficiency For A Mid-Depth Lagrangian Profiling Float, B. Mcgilvray, C. Roman May 2010

Control System Performance And Efficiency For A Mid-Depth Lagrangian Profiling Float, B. Mcgilvray, C. Roman

Christopher N. Roman

This paper presents the development of a new mid-depth Lagrangian profiling float with a primary emphasis on the control system performance and efficiency. While deep water floats have demonstrated much success in open ocean environments, many are not suited for the additional challenges associated with coastal regions. To study these regions, which are often subject to varying bathymetry within the operating range and higher variations in water density, a more advanced system is required. This new design utilizes pressure and altitude feedback to drive a high volume auto-ballasting system (ABS). The main operating modes of this float include step inputs …


Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia Dec 2009

Using A Majority Voting Hardware Method On Weather Information To Increase The Accuracy Of Decision Making Methods, Sanaz Asadinia

Sanaz Asadinia

No abstract provided.


A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad Dec 2009

A Hybrid Routing Algorithm Based On Ant Colony And Zhls Routing Protocol For Manet, Marjan Rafsanjani, Sanaz Asadinia, Farzaneh Pakzad

Sanaz Asadinia

Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on …