Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Digital Communications and Networking

Use Of Mobile Phone Computing For Development Of Student 21st Century Skills, Susan M. Merritt, R. Lara Lee Dec 2010

Use Of Mobile Phone Computing For Development Of Student 21st Century Skills, Susan M. Merritt, R. Lara Lee

Cornerstone 2 Reports : Community Outreach and Empowerment Through Service Learning and Volunteerism

Mobile phone computing enables immediate capture and transfer of data, images, notes and experiences from the field to a repository where retrieval, analysis, edits, aggregation, and further development are possible. Immediate findings and later results can be shared on the Web with local and global communities, and development of integrated service learning projects in concert with underserved communities is possible using this mode of information gathering and sharing.

Mobile phone computing incorporates moments when participants build tomorrow's skills while addressing today's learning goals. Use of digital tools and supporting resources bring real world problems into focus. Mobile phone computing enables …


Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …