Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Dartmouth College (46)
- Edith Cowan University (12)
- Singapore Management University (11)
- Brigham Young University (6)
- University for Business and Technology in Kosovo (4)
-
- Selected Works (3)
- GALILEO, University System of Georgia (2)
- Nova Southeastern University (2)
- TÜBİTAK (2)
- University of Kentucky (2)
- Clemson University (1)
- Governors State University (1)
- Marquette University (1)
- Minnesota State University, Mankato (1)
- Old Dominion University (1)
- Syracuse University (1)
- University of Central Florida (1)
- University of Massachusetts Amherst (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas (1)
- University of Tennessee, Knoxville (1)
- Western Michigan University (1)
- Publication Year
- Publication
-
- Dartmouth Scholarship (46)
- Research Collection School Of Computing and Information Systems (11)
- Theses and Dissertations (6)
- Australian Information Security Management Conference (4)
- Australian Digital Forensics Conference (3)
-
- CCE Theses and Dissertations (2)
- Computer Science and Information Technology Grants Collections (2)
- Doctoral Dissertations (2)
- Emmanuel O. Agu (2)
- Faculty Publications (2)
- Research outputs pre 2011 (2)
- Turkish Journal of Electrical Engineering and Computer Sciences (2)
- All Capstone Projects (1)
- All Theses (1)
- Australian Information Warfare and Security Conference (1)
- Australian eHealth Informatics and Security Conference (1)
- Clinton Carpene (1)
- Computer Science Theses & Dissertations (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1934 -) (1)
- Electrical Engineering and Computer Science - All Scholarship (1)
- Electronic Theses and Dissertations (1)
- Information Science Faculty Publications (1)
- International Journal of Business and Technology (1)
- Journal of Undergraduate Research at Minnesota State University, Mankato (1)
- Policy Briefs and Reports (1)
- Research outputs 2014 to 2021 (1)
- The Hilltop Review (1)
- Theses and Dissertations--Computer Science (1)
- UBT International Conference (1)
- Publication Type
- File Type
Articles 1 - 30 of 102
Full-Text Articles in Physical Sciences and Mathematics
Tracking People Across Ultra Populated Indoor Spaces By Matching Unreliable Wi-Fi Signals With Disconnected Video Feeds, Quang Hai Truong, Dheryta Jaisinghani, Shubham Jain, Arunesh Sinha, Jeong Gil Ko, Rajesh Krishna Balan
Tracking People Across Ultra Populated Indoor Spaces By Matching Unreliable Wi-Fi Signals With Disconnected Video Feeds, Quang Hai Truong, Dheryta Jaisinghani, Shubham Jain, Arunesh Sinha, Jeong Gil Ko, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
Tracking in dense indoor environments where several thousands of people move around is an extremely challenging problem. In this paper, we present a system — DenseTrack for tracking people in such environments. DenseTrack leverages data from the sensing modalities that are already present in these environments — Wi-Fi (from enterprise network deployments) and Video (from surveillance cameras). We combine Wi-Fi information with video data to overcome the individual errors induced by these modalities. More precisely, the locations derived from video are used to overcome the localization errors inherent in using Wi-Fi signals where precise Wi-Fi MAC IDs are used to …
A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong
A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong
Research Collection School Of Computing and Information Systems
Digital microfluidic, as an emerging and potential technology, diversifies the biochemical applications platform, such as protein dilution sewage detection. At present, a vast majority of universal cyberphysical digital microfluidic biochips (DMFBs) transmit data through wires via personal computers and microcontrollers (like Arduino), consequently, susceptible to various security threats and with the popularity of wireless devices, losing competitiveness gradually. On the premise that security be ensured first and foremost, calls for wireless portable, safe, and economical DMFBs are imperative to expand their application fields, engage more users, and cater to the trend of future wireless communication. To this end, a new …
Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer
Broadband Equity, Access, And Deployment In Nevada, Brad Wimmer
Policy Briefs and Reports
The $45.45 billion Broadband, Equity, Access, and Deployment (BEAD) program’s primary objective is to extend broadband service to all unserved and underserved locations in the U.S. and its territories. Several industry studies predict that the BEAD program can meet its goal of providing universal access to broadband service if eligible entities execute their grant programs well. My review of the BEAD program indicates that policy makers can enhance the likelihood of program success by designing competitive grant programs that give applicants the incentive to undercut the subsidies proposed by their rivals and provide applicants the flexibility to design networks that …
Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz
Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz
Dartmouth Scholarship
Data about users is collected constantly by phones, cameras, Internet websites, and others. The advent of so-called ‘Smart Things' now enable ever-more sensitive data to be collected inside that most private of spaces: the home. The first step in helping users regain control of their information (inside their home) is to alert them to the presence of potentially unwanted electronics. In this paper, we present a system that could help homeowners (or home dwellers) find electronic devices in their living space. Specifically, we demonstrate the use of harmonic radars (sometimes called nonlinear junction detectors), which have also been used in …
Nb-Iot: Iot Përmes Sistemeve Celulare Brez-Ngushta, Besart Haziri
Nb-Iot: Iot Përmes Sistemeve Celulare Brez-Ngushta, Besart Haziri
Theses and Dissertations
Me rritjen e numrit të pajisjeve IoT në ditët e sotme, kërkesa për t’i mbështetur ato vetëm sa rritet, me rreth 7.6 miliardë pajisje IoT aktive në fund të vitit 2019, si dhe me një pritshmëri të rritjes deri në 24.1 miliardë pajisje IoT në vitin 2030. Me numër kaq të madh të pajisjeve që do të lidhen në Internet atëherë na duhet siguri dhe rrjet i besueshëm që i mbështet të gjitha këto pajisje. Mundësia më e mirë për këtë çështje është NB-IoT (Narrowband–Internet of Things).
NB-IoT mundëson konektimin e qindra-mijëra pajisjeve të vogla (sensorëve) në Internet përmes sistemeve …
Analiza E Efekteve Shëndetsore Gjatë Përdorimit Të Rrjetave Pa Tela Në Kushtet E Jetës Reale, Hashim Sahiti
Analiza E Efekteve Shëndetsore Gjatë Përdorimit Të Rrjetave Pa Tela Në Kushtet E Jetës Reale, Hashim Sahiti
Theses and Dissertations
Teknologjia Wireless u ideua në 1880 nga Alexander Graham Bell dhe Sumner Tainted kur u zbulua telefoni fotografik. Në ditët e sotme, ka shumë lloje të pajisjeve pa tela që përdoren për të komunikuar. Telefoni celular dhe Rrjeti Wireless janë pjesa e jetës sonë të përditshme në të gjithë botën. Pajisja Wi-Fi lejon shkëmbimin (marrjen dhe dërgimin) e të dhënave përmes pajisjeve pa tela dhe Wi-Fi lëshojnë valë radio. Pajisjet që përdorin Wi-Fi janë kompjuterët, tabletat, celularët, audio player, aparatet fotografikë digjital si dhe pajisjet përcjellëse te kompjuterit si printerët, tastiera, miu e etj. Pajisjet pa tela janë të bazuara …
The Limits Of Location Privacy In Mobile Devices, Keen Yuun Sung
The Limits Of Location Privacy In Mobile Devices, Keen Yuun Sung
Doctoral Dissertations
Mobile phones are widely adopted by users across the world today. However, the privacy implications of persistent connectivity are not well understood. This dissertation focuses on one important concern of mobile phone users: location privacy. I approach this problem from the perspective of three adversaries that users are exposed to via smartphone apps: the mobile advertiser, the app developer, and the cellular service provider. First, I quantify the proportion of mobile users who use location permissive apps and are able to be tracked through their advertising identifier, and demonstrate a mark and recapture attack that allows continued tracking of users …
Energy Efficiency In Cmos Power Amplifier Designs For Ultralow Power Mobile Wireless Communication Systems, Selvakumar Mariappan, Jagadheswaran Rajendran, Norlaili Mohd Noh, Harikrishnan Ramiah, Asrulnizam Abd Manaf
Energy Efficiency In Cmos Power Amplifier Designs For Ultralow Power Mobile Wireless Communication Systems, Selvakumar Mariappan, Jagadheswaran Rajendran, Norlaili Mohd Noh, Harikrishnan Ramiah, Asrulnizam Abd Manaf
Turkish Journal of Electrical Engineering and Computer Sciences
Wireless communication standards keep evolving so that the requirement for high data rate operation can be fulfilled. This leads to the efforts in designing high linearity and low power consumption radio frequency power amplifier (RFPA) to support high data rate signal transmission and preserving battery life. The percentage of the DC power of the transceiver utilized by the power amplifier (PA) depends on the efficiency of the PA, user data rate, propagation conditions, signal modulations, and communication protocols. For example, the PA of a WLAN transceiver consumes 49 % of the overall efficiency from the transmitter. Hence, operating the PA …
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
International Journal of Business and Technology
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …
Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori
Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori
Theses and Dissertations--Computer Science
Rapid urbanization burdens city infrastructure and creates the need for local governments to maximize the usage of resources to serve its citizens. Smart city projects aim to alleviate the urbanization problem by deploying a vast amount of Internet-of-things (IoT) devices to monitor and manage environmental conditions and infrastructure. However, smart city projects can be extremely expensive to deploy and manage partly due to the cost of providing Internet connectivity via 5G or WiFi to IoT devices. This thesis proposes the use of delay tolerant networks (DTNs) as a backbone for smart city communication; enabling developing communities to become smart cities …
Optical Wireless Data Center Networks, Abdelbaset S. Hamza
Optical Wireless Data Center Networks, Abdelbaset S. Hamza
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Bandwidth and computation-intensive Big Data applications in disciplines like social media, bio- and nano-informatics, Internet-of-Things (IoT), and real-time analytics, are pushing existing access and core (backbone) networks as well as Data Center Networks (DCNs) to their limits. Next generation DCNs must support continuously increasing network traffic while satisfying minimum performance requirements of latency, reliability, flexibility and scalability. Therefore, a larger number of cables (i.e., copper-cables and fiber optics) may be required in conventional wired DCNs. In addition to limiting the possible topologies, large number of cables may result into design and development problems related to wire ducting and maintenance, heat …
Wireless Security (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng
Wireless Security (Ksu), Meng Han, Lei Li, Zhigang Li, Svetana Peltsverger, Ming Yang, Guangzhi Zheng
Computer Science and Information Technology Grants Collections
This Grants Collection for Wireless Security was created under a Round Ten ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum
Computer Science and Information Technology Grants Collections
This Grants Collection for Wireless Security was created under a Round Eight ALG Textbook Transformation Grant.
Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.
Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:
- Linked Syllabus
- Initial Proposal
- Final Report
Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz
Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz
Dartmouth Scholarship
We present a crowdsourcing system that extends the capabilities of location-based applications and allows users to connect and exchange information with users in spatial and temporal proximity. We define this incident of spatio-temporal proximity as a \em close encounter. Typically, location-based application users store their information on a server, and trust the server to provide access only to authorized users, not misuse the data or disclose their location history. Our system, called SPICE, addresses these privacy issues by leveraging Wi-Fi access points to connect users and encrypt their information before it is exchanged, so only users in close encounters have …
An Extremely Wideband Radome-Enclosed Cylindrical Dipole Antenna For Wireless Communication, Tariq Rahim, Jiadong Xu
An Extremely Wideband Radome-Enclosed Cylindrical Dipole Antenna For Wireless Communication, Tariq Rahim, Jiadong Xu
Turkish Journal of Electrical Engineering and Computer Sciences
A radome-enclosed extremely wideband cylindrical dipole antenna for wireless communications applications was proposed with a simple structure. The antenna is fed at the center with the help of a coaxial cable through the lower hollow metallic pole. The feed area is composed of cones at both sides in order to obtain wideband impedance matching. The proposed antenna can cover 1.8 GHz to 28 GHz with S11 of less than -10 dB and excellent stable omnidirectional radiation characteristics. However, at high frequencies, some ripples are introduced in the radiation pattern. The frequency band of the cylindrical dipole antenna can be controllable …
A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet
A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet
Australian Digital Forensics Conference
Spontaneous ad hoc networks are distinguished by rapid deployment for a specific purpose, with no forward planning or pre-design in their topology. Often these networks will spring up through necessity whenever a network is required urgently but briefly. This may be in a disaster recovery setting, military uses where often the network is unplanned but the devices are pre-installed with security settings, educational networks or networks created as a one-off for a meeting such as in a business organisation. Generally, wireless networks pose problems for forensic investigators because of the open nature of the medium, but if logging procedures and …
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
UBT International Conference
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …
Towards Aggregating Time-Discounted Information In Sensor Networks, Xianping Wang
Towards Aggregating Time-Discounted Information In Sensor Networks, Xianping Wang
Computer Science Theses & Dissertations
Sensor networks are deployed to monitor a seemingly endless list of events in a multitude of application domains. Through data collection and aggregation enhanced with data mining and machine learning techniques, many static and dynamic patterns can be found by sensor networks. The aggregation problem is complicated by the fact that the perceived value of the data collected by the sensors is affected by many factors such as time, location and user valuation. In addition, the value of information deteriorates often dramatically over time. Through our research, we already achieved some results:
A formal algebraic analysis of information discounting, especially …
Demo: Wanda, Securely Introducing Mobile Devices, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz
Demo: Wanda, Securely Introducing Mobile Devices, Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, David Kotz
Dartmouth Scholarship
Nearly every setting is increasingly populated with wireless and mobile devices – whether appliances in a home, medical devices in a health clinic, sensors in an industrial setting, or devices in an office or school. There are three fundamental operations when bringing a new device into any of these settings: (1) to configure the device to join the wireless local-area network, (2) to partner the device with other nearby devices so they can work together, and (3) to configure the device so it connects to the relevant individual or organizational account in the cloud. The challenge is to accomplish all …
Development Of A Wireless Mobile Computing Platform For Fall Risk Prediction, Akm Jahangir Alam Majumder
Development Of A Wireless Mobile Computing Platform For Fall Risk Prediction, Akm Jahangir Alam Majumder
Dissertations (1934 -)
Falls are a major health risk with which the elderly and disabled must contend. Scientific research on smartphone-based gait detection systems using the Internet of Things (IoT) has recently become an important component in monitoring injuries due to these falls. Analysis of human gait for detecting falls is the subject of many research projects. Progress in these systems, the capabilities of smartphones, and the IoT are enabling the advancement of sophisticated mobile computing applications that detect falls after they have occurred. This detection has been the focus of most fall-related research; however, ensuring preventive measures that predict a fall is …
Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki
Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki
Emmanuel O. Agu
End-hosts on wireless ad hoc networks typically use TCP as their transport layer protocol. Being designed for wired networks, TCP can perform poorly over wireless networks. Work that has proposed ways to improve TCP performance over wireless networks has concentrated primarily on improving TCP throughput only. Emerging applications, such as interactive multimedia and network games, require reduced delay at least as much as increased throughput. In this paper, we propose LDM1, an IP layer queue marking mechanism that estimates the number of hops and flows at each wireless node to computes the optimal marking probability. We present simulation results and …
Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki
Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki
Emmanuel O. Agu
The TCP-Friendly Rate Control (TFRC) is used as a streaming media transport protocol. Using the TCP congestion response function and current network conditions, TFRC adjusts its transmission rate to yield the maximum TCP-Friendly throughput when sharing capacity with TCP flows. Since TFRC was designed for wired networks, it does not achieve the maximum TCP-Friendly throughput in multihop ad hoc wireless networks. The reduced wireless spatial channel reuse due to hidden terminals in multihop wireless networks induces TFRC throughput reductions. Specifically, TFRC is unaware of MAC layer transmission delays due to collisions, retransmissions and MAC layer congestion. This paper illustrates that …
Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz
Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz
Dartmouth Scholarship
Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal …
Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz
Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz
Dartmouth Scholarship
CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth) is a popular research data archive for wireless network data, archiving over 100 datasets used by over 6,500 users. In this paper we examine citation behaviour amongst 1,281 papers that use CRAWDAD datasets. We find that (in general) paper authors cite datasets in a manner that is sufficient for providing credit to dataset authors and also provides access to the datasets that were used. Only 11.5% of papers did not do so; common problems included (1) citing the canonical papers rather than the dataset, (2) describing the dataset using unclear identifiers, …
Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme
Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme
Clinton Carpene
An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware and software and that configuration issues further compounded these vulnerabilities. The cyber threat against critical infrastructure has been public knowledge for several years, and with increasing awareness, attention and resource being devoted to protecting critical in the structure, it is …
Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley
Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley
The Hilltop Review
In Wi-Fi location determination literature, little attention is paid to locations that do not have numeric, geometric coordinates, though many users prefer the convenience of non-coordinate locations (consider the ease of giving a street address as opposed to giving latitude and longitude). It is not often easy to tell from the title or abstract of a Wi-Fi location determination article whether or not it has applicability to semantic locations such as room-level names. This article surveys the literature through 2011 on Wi-Fi localization for symbolic locations.
The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet
The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet
Australian Information Security Management Conference
Mobile Ad Hoc Networks (MANETS) promise much in the ability to rapidly deploy a wireless network in a fashion where no prior planning is needed and the network can be running efficiently and with high security within minutes. Natural disaster response, military, education and business provide areas where MANETS can offer significant advantages in communication where infrastructure networks may take days to set up or may be impossible to implement. This research reviews a selection of MANET protocols to show the progression of the research and the issues that are yet to be addressed. It discusses the challenges to researchers …
Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward
Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward
Research outputs 2014 to 2021
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …
Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw
Managing Wireless Security Risks In Medical Services, Brian Cusack, Akar Kyaw
Australian eHealth Informatics and Security Conference
Medical systems are designed for a range of end users from different professional skill groups and people who carry the devices in and on their bodies. Open, accurate, and efficient communication is the priority for medical systems and consequently strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorise ways to mitigate wireless security vulnerabilities. The benefits of wireless medical services are great in terms of efficiencies, mobility, and information management. These benefits may be realised by treating the vulnerabilities and …