Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Mobile computing

Theses and Dissertations

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey Sep 2010

Reputation-Based Internet Protocol Security: A Multilayer Security Framework For Mobil Ad Hoc Networks, Timothy H. Lacey

Theses and Dissertations

This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of …


Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard Sep 2010

Hijacking User Uploads To Online Persistent Data Repositories For Covert Data Exfiltration, Curtis P. Barnard

Theses and Dissertations

As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware often has a need to communicate back to the author, or other machines that are also infected. Several techniques for transmitting this data covertly have been developed over the years which vary significantly in their level of sophistication. This research creates a new covert channel technique for stealing information from a network by piggybacking on user-generated network traffic. Specifically, steganography drop boxes and passive covert channels are merged …


An Investigation Into The Advantages, Mechanisms, And Developmental Challenges Of Scripted Mobile Routing, Boyeon Jang Mar 2008

An Investigation Into The Advantages, Mechanisms, And Developmental Challenges Of Scripted Mobile Routing, Boyeon Jang

Theses and Dissertations

Mobile Ad Hoc Network (MANET) routing protocols provide routing solutions in mobile wireless networks, without assuming any prior knowledge of topology nor any prediction of future topology. However, the resulting routes suffer from delay and consume precious bandwidth. Perfectly scripted routing could theoretically be optimal, (i.e., introduce no delay and cost no additional bandwidth), but would naturally be very fragile. This thesis explores a merging of these approaches, following a routing script if and when available, but reverting to a robust recovery approach otherwise. Script-Assisted Ad Hoc On-demand Distance Vector (S-AODV) routing protocol is designed to take advantage of prior …


The Spillable Environment: Expanding A Handheld Device's Screen Real Estate And Interactive Capabilities, Jeffrey S. Clement Aug 2007

The Spillable Environment: Expanding A Handheld Device's Screen Real Estate And Interactive Capabilities, Jeffrey S. Clement

Theses and Dissertations

Handheld devices have a limited amount of screen real estate. If a handheld device could take advantage of larger screens, it would create a more powerful user interface and environment. As time progresses, Moore's law predicts that the computational power of handheld devices will increase dramatically in the future, promoting the interaction with a larger screen. Users can then use their peripheral vision to recognize spatial relationships between objects and solve problems more easily with this integrated system. In the spillable environment, the handheld device uses a DiamondTouch Table, a large, touch-sensitive horizontal table, to enhance the viewing environment. When …