Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 23 of 23

Full-Text Articles in Digital Communications and Networking

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre Jul 2023

Designing Intelligent Energy Efficient Scheduling Algorithm To Support Massive Iot Communication In Lora Networks, Jui Mhatre

Master of Science in Computer Science Theses

We are about to enter a new world with sixth sense ability – “Network as a sensor -6G”. The driving force behind digital sensing abilities is IoT. Due to their capacity to work in high frequency, 6G devices have voracious energy demand. Hence there is a growing need to work on green solutions to support the underlying 6G network by making it more energy efficient. Low cost, low energy, and long-range communication capability make LoRa the most adopted and promising network for IoT devices. Since LoRaWAN uses ALOHA for multi-access of channels, collision management is an important task. Moreover, in …


Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild Apr 2023

Encrypted Malicious Network Traffic Detection Using Machine Learning, Niklas Knipschild

Symposium of Student Scholars

The research project aims to find ways to detect malicious packets inside encrypted network traffic. In addition to this goal maintaining user privacy is a priority. As encryption has become less expensive to implement more and more network traffic is encrypted. Currently, 90% of all network traffic is encrypted, and this trend is expected to increase. The creators of malware areemploying various methods to ensure delivery of their malware, including encryption. One proposed method to combat this suggests implementing machine learning with various algorithms to analyze packet attributes to determine if they contain malware, without actually knowing what's inside …


Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman Apr 2022

Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman

Symposium of Student Scholars

Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications

Poster Presentation Undergraduate Student: Luanne Seaman

Research Mentor: Dr. Billy Kihei

Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …


Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre Nov 2021

Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre

Symposium of Student Scholars

With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …


Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh Aug 2021

Rollover V2x Soft Antenna For Vehicular Safety, Jiwoo Park, Devansh Singh

Symposium of Student Scholars

Vehicle-2-Everything (V2X) technology can make roads safer by allowing vehicles to communicate with each other. The goal of V2X is to reduce accidents where there is not a line-of-sight of the other vehicle, such as at intersections, in harsh driving conditions, and around curves. Considering that the antenna for V2X will be mounted on the roof, how then should a turned over vehicle communicate reliably with other vehicles if another antenna doesn't also exist on the bottom of the vehicle? We explore using soft-robotics for deploying a spare antenna from under the vehicle. Experiments show that when the antenna is …


Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy Aug 2021

Securing Global Positioning Systems In A Blockchain Using Vehicle-To-Everything Communications, Malik Purefoy

Symposium of Student Scholars

Intelligent transportation systems (ITS) are being deployed globally to support vehicular safety innovation using wireless communication. The ITS paradigm of vehicle-to-everything communication (V2X) enables vehicles equipped with an on-board unit (OBU) to communicate with a roadside unit (RSU) infrastructure to provide safe intersection movements between similarly equipped vehicles, pedestrians, and animal life. However, the current paradigm relies heavily on the availability of a Global Positioning System (GPS) for ensuring road user safety. In a doomsday scenario where GPS becomes unavailable, collision avoidance services provided through V2X may be rendered unavailable. The proposed solution is to develop a secure and reliable …


Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown Aug 2021

Design And Test Of Novel Vehicle-To-Everything Packet For Sensor Arrays In Under Roadway Deployment, Marquis Brown

Symposium of Student Scholars

Title: Design and Test of Novel Vehicle-to-Everything Packet for Sensor Arrays in Under Roadway Deployment

Poster Presentation Undergraduate Student(s): Hakeem Wilson, Marquis Brown Research Mentor(s): Dr. Billy Kihei

Vehicle-to-Everything (V2X) communications is a burgeoning technology that will enable safer, greener, and more productive usage of roadways. In the V2X paradigm, all equipped vehicles and infrastructure can communicate with each other in real-time. By utilizing V2X communications as an Internet-of-Things gateway, a sensor array installed under roadways, allows real-time monitoring of road conditions which increases overall road safety and road maintenance cost. In our research, we have utilized the WAVE Short …


Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson Aug 2021

Detecting Primitive Jamming Attacks Using Machine Learning In Vehicle-To-Everything Networks​, Hakeem Wilson

Symposium of Student Scholars

Vehicle-to-Everything communications (V2X) is gaining additional ground as an upcoming ad hoc safety network. In V2X, basic safety messages are used for exchanging critical information between vehicles at a set broadcast rate. However, jamming attacks on the safety spectrum could deny V2X radios the ability to save lives on the roadway. This preliminary work analyzes two types of primitive jamming attacks performed on target V2X devices. Lab results reveal that V2X networks are easily susceptible to jamming attacks, due to all V2X standards lacking a requirement to detect/mitigate jamming. To avert this threat and promote safety of life on the …


Long Distance Li-Fi, Adeyemi Fagbemi Aug 2021

Long Distance Li-Fi, Adeyemi Fagbemi

Symposium of Student Scholars

Wi-Fi has been in existence since 1998 providing an increase in the amount of data transmitted and generated by machines. With the growing market demand for network bandwidth, it will make it nearly impossible for typical radio frequency (RF) technologies like Wi-Fi to supply the resources needed for the data transmission. As a complementary solution, Li-Fi was introduced in 2011 as a method of data transfer through the use light of light sources. Li-Fi employs the use of visible light spectrum which has 1000 more times the bandwidth of typical RF spectrums. This study investigates the distance to which this …


Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore May 2021

Design And Implementation Of A Microservices Web-Based Architecture For Code Deployment And Testing, Soin Abdoul Kassif Traore

Symposium of Student Scholars

Design and Implementation of a Microservices Web-based Architecture for CodeDeployment and Testing

Many tech stars like Netflix, Amazon, PayPal, eBay, and Twitter are evolving from monolithic to a microservice architecture due to the benefits for Agile and DevOps teams. Microservices architecture can be applied to multiple industries, like IoT, using containerization. Virtual containers give an ideal environment for developing and testing of IoT technologies. Since the IoT industry has an exponential growth, it is the responsibility of universities to teach IoT with hands-on labs to minimize the gap between what the students learn and what is on-demand in the job …


Framework For Collecting Data From Iot Device, Md Saiful Islam May 2021

Framework For Collecting Data From Iot Device, Md Saiful Islam

Symposium of Student Scholars

The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …


Project Blipper, Peter Jacobs, Preston Delaware, Ryan Foster Apr 2021

Project Blipper, Peter Jacobs, Preston Delaware, Ryan Foster

Senior Design Project For Engineers

This project was sponsored by Clorox to design and create an automatic bottle-unscrambling system for possible implementation at their bottling plant in Chile. The objective was to use a robotic arm to unscramble bottles from an incoming conveyor belt and place them upright on an outbound conveyor belt. Throughout the research, design, and testing of solutions for this project, several design alternatives were found for each discipline, and will be presented to Clorox so that they can make an informed decision for how and if they want to move forward with implementation of this project.

The project was split into …


Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke Jul 2020

Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke

African Conference on Information Systems and Technology

The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.

Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data …


Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw Jul 2020

Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw

African Conference on Information Systems and Technology

The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are forcing companies …


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …


Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj . Apr 2019

Public Blockchain Scalability: Advancements, Challenges And The Future, Amritraj .

Master of Science in Software Engineering Theses

In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. But recently, public and permissionless blockchains such as Bitcoin and Ethereum have faced stumbling blocks in the form of scalability. Both Bitcoin and Ethereum process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA that can process approximately 1,700 transactions per second. In realizing this hindrance in the wide range adoption of blockchains for building advanced and large scalable …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli Oct 2018

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi Patel Aug 2018

An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi Patel

Master of Science in Computer Science Theses

Evaluation of traditional classroom has led to electronic classroom i.e. e-learning. Growth of traditional classroom doesn’t stop at e-learning or distance learning. Next step to electronic classroom is a smart classroom. Most popular features of electronic classroom is capturing video/photos of lecture content and extracting handwriting for note-taking. Numerous techniques have been implemented in order to extract handwriting from video/photo of the lecture but still the deficiency of few techniques can be resolved, and which can turn electronic classroom into smart classroom.

In this thesis, we present a real-time IoT system to convert handwritten text into editable format by implementing …


The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki Apr 2018

The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki

The African Journal of Information Systems

Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …


Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall Jun 2017

Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall

The Kennesaw Journal of Undergraduate Research

The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …


Ultrasonic Data Transmission And Steganography, Hunter Young Mar 2016

Ultrasonic Data Transmission And Steganography, Hunter Young

KSU Journey Honors College Capstones and Theses

This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information …