Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (13)
- Physical Sciences and Mathematics (13)
- Digital Communications and Networking (10)
- Electrical and Computer Engineering (8)
- Information Security (2)
-
- OS and Networks (2)
- Automotive Engineering (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer and Systems Architecture (1)
- Controls and Control Theory (1)
- Hardware Systems (1)
- Robotics (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Systems Architecture (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Institution
- Publication Year
- Publication
- Publication Type
- File Type
Articles 1 - 24 of 24
Full-Text Articles in Computer Engineering
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Service Competition And Data-Centric Protocols For Internet Access, Thiago Teixeira
Doctoral Dissertations
The Internet evolved in many aspects, from the application to the physical layers. However, the evolution of the Internet access technologies, most visible in dense urban scenarios, is not easily noticeable in sparsely populated and rural areas. In the United States, for example, the FCC identified that 50% of the census blocks have access to up to two broadband providers; however, these providers do not necessarily compete. Additionally, due to the methodology of the study, there is evidence that the number of actual customers without broadband access is higher since the FCC considers the entire block to have broadband if …
A Comprehensive Methodology To Evaluate The Performance Of A Cooperative Wireless Network, Aykut Kalaycioğlu, Ahmet Akbulut, Asim Egemen Yilmaz, Di̇lek Arslan
A Comprehensive Methodology To Evaluate The Performance Of A Cooperative Wireless Network, Aykut Kalaycioğlu, Ahmet Akbulut, Asim Egemen Yilmaz, Di̇lek Arslan
Turkish Journal of Electrical Engineering and Computer Sciences
Performance evaluation of a cooperative wireless communication network depends on several parameters. Many of the studies, in fact, take a limited number of performance metrics individually to reach a conclusion about the performance of a network. Besides, in general, some performance metrics might be in conflict. Thus, ignoring the combined effect of all performance criteria in the network may lead to an incorrect conception of the overall communication performance of the network. Therefore, in this study, a comprehensive evaluation methodology in terms of various metrics is proposed to calculate the performance of a cooperative wireless communication network deployment using a …
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy
Computer Science Theses & Dissertations
Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …
Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu
Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu
Research Collection School Of Computing and Information Systems
Many object localization applications need the relative locations of a set of objects as oppose to their absolute locations. Although many schemes for object localization using radio frequency identification (RFID) tags have been proposed, they mostly focus on absolute object localization and are not suitable for relative object localization because of large error margins and the special hardware that they require. In this paper, we propose an approach called spatial-temporal phase profiling (STPP) to RFID-based relative object localization. The basic idea of STPP is that by moving a reader over a set of tags during which the reader continuously interrogating …
On Designing Collaborative Robotic Systems With Real-Time Operating Systems And Wireless Networks, Andrew Jacob Wolin
On Designing Collaborative Robotic Systems With Real-Time Operating Systems And Wireless Networks, Andrew Jacob Wolin
Boise State University Theses and Dissertations
Robotic devices currently solve many real-world problems but do so primarily on an individual basis. The ability to deploy large quantities of robots to solve problems has not yet been widely embraced partially due to the complex nature of robotics and levels of research investment.
Existing research in robot collaboration largely exists in the forms of models and simulations. This work seeks to accelerate the next level of research in this area by providing a low cost, collaborative capable robotic system. This platform can be used as a gateway to transport simulations into physical representations. This research not only presents …
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as …
Wireless Sensor Localization Using Enhanced Dv-Aoa Algorithm, Peter Brida, Juraj Machaj, Jozef Benikovsky
Wireless Sensor Localization Using Enhanced Dv-Aoa Algorithm, Peter Brida, Juraj Machaj, Jozef Benikovsky
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, we deal with the improvement of the positioning accuracy of distance vector (DV)-based positioning algorithms, which use angular information DV- angle of arrival (AoA). This algorithm belongs to an ad-hoc positioning system. We focus on the improvement of the algorithm and its enhanced version is presented. The angular information of particular nodes is obtained and processed by the original algorithm; however, the final position estimation is determined by the proposed novel algorithm using only a subset of all intersections. We assign weights to the individual intersections according to their positions and the positions of the RNs. For …
Fault Tolerant Broadcasting Analysis In Wireless Monitoring Networks, Akbar Ghaffarpour Rahbar
Fault Tolerant Broadcasting Analysis In Wireless Monitoring Networks, Akbar Ghaffarpour Rahbar
Turkish Journal of Electrical Engineering and Computer Sciences
Wireless monitoring networks can be used for security applications such as the monitoring of narrow passages and operational fields. These networks can be designed based on sensor networks. In sensor networks, each node can hear a message and broadcast the message to its neighbor nodes. Nevertheless, nodes may fail, so that faulty nodes cannot hear or cannot transmit any message, where the locations of the faulty nodes are unknown and their failures are permanent. In this paper, the nodes are situated on a line or a square grid-based topology in a plane for security/monitoring applications. For each topology, 2 nonadaptive …
Horizontal Dilution Of Precision-Based Ultra-Wideband Positioning Technique For Indoor Environments, Kerem Küçük
Horizontal Dilution Of Precision-Based Ultra-Wideband Positioning Technique For Indoor Environments, Kerem Küçük
Turkish Journal of Electrical Engineering and Computer Sciences
Ultra-wideband (UWB) technology provides considerable performance in many indoor localization problems thanks to its very wide spectrum and high-resolution characteristics. In this paper, we propose using the horizontal dilution of precision (HDOP) to decrease the localization error in indoor environments for UWB localization systems. To achieve this aim, first we determine the positioning accuracy of a commercially available UWB positioning system using laboratory experiments. Next, the results of the position estimations obtained by the HDOP are compared with the experimental results acquired by the UWB positioning system. Finally, we investigate a detailed comparison with the least squares (LS), nonlinear regression …
Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam
Wispernet: Anti-Jamming For Wireless Sensor Networks, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …
Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam
Anti-Jamming For Embedded Wireless Networks, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration and coordinate communication to extend their battery life. This results in well-defined communication patterns with possibly predictable intervals of activity that are easily detected and jammed by a statistical jammer. We present an anti-jamming protocol for sensor networks which eliminates spatio-temporal patterns …
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …
Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan
Providing Location Security In Vehicular Ad Hoc Networks, Gongjun Yan
Computer Science Theses & Dissertations
Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We present validation mechanisms to provide location integrity for VANETs. In the initial mechanism, we assume that all vehicles are equipped with a radar, a GPS receiver, and a transceiver. Since radar has a limited radar range and transceiver has a limited transmission range, we build network cells as a security unit as well …
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood
International Conference on Information and Communication Technologies
New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …
Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran
Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran
Patrick Tague
Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming …
Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo
Probabilistic Approaches To The Design Of Wireless Ad Hoc And Sensor Networks, Zhen Guo
Dissertations
The emerging wireless technologies has made ubiquitous wireless access a reality and enabled wireless systems to support a large variety of applications. Since the wireless self-configuring networks do not require infrastructure and promise greater flexibility and better coverage, wireless ad hoc and sensor networks have been under intensive research. It is believed that wireless ad hoc and sensor networks can become as important as the Internet. Just as the Internet allows access to digital information anywhere, ad hoc and sensor networks will provide remote interaction with the physical world.
Dynamics of the object distribution is one of the most important …
Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi
Qos Provisioning For Multi-Class Traffic In Wireless Networks, Mona El-Kadi Rizvi
Computer Science Theses & Dissertations
Physical constraints, bandwidth constraints and host mobility all contribute to the difficulty of providing Quality of Service (QoS) guarantees in wireless networks. There is a growing demand for wireless networks to support all the services that are available on wired networks. These diverse services, such as email, instant messaging, web browsing, video conferencing, telephony and paging all place different demands on the network, making QoS provisioning for wireless networks that carry multiple classes of traffic a complex problem. We have developed a set of admission control and resource reservation schemes for QoS provisioning in multi-class wireless networks.
We present three …
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Low Interference Routing For Wireless Ad-Hoc Networks, Mohit Gupta
Theses
In this thesis the primary focus is on the problem of interference between messages. The thesis discusses why the messages are blocked in a system? How adding a message impacts the cost of all other available links, which can be established in the system.
This thesis analyzes how the availability of channels, increase in number of nodes and increase in the transmission range help in increasing the number of messages that can be handled in the network. It is also analyzes how critical is the selection of the maximum transmission range MTR, transmission range TR and required transmission range RTR. …
Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou
Efficient Resource Allocation And Call Admission Control In High Capacity Wireless Networks, Jiongkuan Hou
Dissertations
Resource Allocation (RA) and Call Admission Control (CAC) in wireless networks are processes that control the allocation of the limited radio resources to mobile stations (MS) in order to maximize the utilization efficiency of radio resources and guarantee the Quality of Service (QoS) requirements of mobile users. In this dissertation, several distributed, adaptive and efficient RA/CAC schemes are proposed and analyzed, in order to improve the system utilization while maintaining the required QoS.
Since the most salient feature of the mobile wireless network is that users are moving, a Mobility Based Channel Reservation (MBCR) scheme is proposed which takes the …
Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah
Tracking The Path Of A Mobile Radioactive Source Using A Wireless Sensor Network, Nipa Shah
Theses
This report describes several experiments used to characterize and test a network of radiation sensors. The purpose of these tests is to assess the feasibility of using these sensors to detect and track radioactive sources in a large field, as in a battlefield or on a military campus. Simulated radiation measurements are used to compare the result of radiation detection accuracy in tracking the moving target and to find its path as early as possible. This is done via changing the number of sensing nodes deployed (deployment density), as well as the models of the detectors. This thesis describes algorithms …
Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.
Comparative Studies Of Network Traffic In Actual And Emulated Wireless Networks, Curtis Salley Jr.
Theses
Wireless networks are becoming more popular in all types of environments from home office, to business infrastructure, to mobile computing. As more of these networks flourish, so does the attraction for hackers. The thesis examines the bandwidth of wireless networks and the effects of intrusions in three different scenarios. First, it looks at a wireless network that is connected to a wired infrastructure. Next, the thesis examines a wireless ad hoc network and how bandwidth plays a valuable part in the communication with neighboring nodes. And finally, the thesis attempts to simulate a wireless network by using a bandwidth configuration …
Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake
Detecting Malfunction In Wireless Sensor Networks, Pablito C. Lake
Theses
The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ability to detect abnormality is critical to the security of any sensor network. However, the ability to detect a faulty wireless sensor is not trivial. Controlled repeatable experiments are difficult in wireless channels. A Redhat Linux. 7.0 Wireless Emulation Dynamic Switch software was used to solve this problem.
Six nodes were configured with a node acting as a base station. The nodes were all part of a cell. This means that every node could communicate with all other nodes. A client-server program simulated the background …
Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta
Sub-Segment Based Transport Layer Protocol For Wireless Medium, Som Sengupta
Theses
This thesis discusses the techniques to improve the TCP over wireless. The loss-intensive wireless communication results in high retransmission rates to recover lost packets and bandwidth consumption. In addition, the retransmitted segments have significant chance of being dropped. To make the retransmission process more granular, large segments at the transport layer (540 bytes, by default) can be subdivided into smaller sub-segments. This document introduces a split TCP based solution and describes how to produce a series of smaller-sized segments that share the same transport layer header. A new header format is introduced to support the transmission of smaller segments …