Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

Theses/Dissertations

2008

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Attribute-Based, Usefully Secure Email, Christopher P. Masone Aug 2008

Attribute-Based, Usefully Secure Email, Christopher P. Masone

Dartmouth College Ph.D Dissertations

A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer Interaction and Security (HCISEC) refutes this assumption. All researchers in this field agree that focusing on aligning usability and security goals can enable the design of systems that will be more secure under actual usage. We bring to bear tools from the social sciences (economics, sociology, psychology, etc.) not only to help us better understand why deployed systems fail, but …


Linkability In Activity Inference Data Sets, Jeffrey Fielding Jun 2008

Linkability In Activity Inference Data Sets, Jeffrey Fielding

Dartmouth College Undergraduate Theses

Activity inference is an active area of ubiquitous computing research. By training machine learning algorithms on data from sensors worn by volunteers, researchers hope to develop software that can interact more naturally with the user by inferring what the user is doing. In this thesis, we use the same sensor data to infer which volunteer is carrying the sensors. Such inference could be useful -- for example, a mobile device might infer who is carrying it and adapt to that user's preferences. It also raises some privacy concerns, since an attacker could learn more about a user by linking together …


Making Rbac Work In Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov Jun 2008

Making Rbac Work In Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov

Dartmouth College Undergraduate Theses

In large organizations with tens of thousands of employees, managing individual people's permissions is tedious and error prone, and thus a possible source of security risks. Role-Based Access Control addresses this problem by grouping users into roles, which reflect job functions in the corporation. Permissions are assigned to roles instead of directly to users, which means that all users assigned to a role have the same set of permissions with respect to that role. However, adoption of RBAC in organizations such as investment banks is hindered by two main factors: first, it is costly and time-consuming to define roles. Second, …


Key Management For Secure Power Scada, Manya K. Sleeper Jun 2008

Key Management For Secure Power Scada, Manya K. Sleeper

Dartmouth College Undergraduate Theses

This thesis proposes a key management protocol for secure power SCADA systems that seeks to take advantage of the full security capacity of a given network by allowing devices to use public key cryptography for key management if they are capable of doing so and reverting to symmetric key cryptography only when such use is necessitated by the weakness of a given device. Allowing devices to obtain different levels of security permits SCADA networks to maximize their security in the decades before such networks are capable of implementing fully public key-based key management protocols. Such a system is obtained through …


A Dynamically Refocusable Sampling Infrastructure For 802.11 Networks, Udayan Deshpande May 2008

A Dynamically Refocusable Sampling Infrastructure For 802.11 Networks, Udayan Deshpande

Dartmouth College Ph.D Dissertations

The edge of the Internet is increasingly wireless. Enterprises large and small, homeowners, and even whole cities have deployed Wi-Fi networks for their users, and many users never need to--- or never bother to--- use the wired network. With the advent of high-throughput wireless networks (such as 802.11n) some new construction, even of large enterprise build- ings, may no longer be wired for Ethernet. To understand Internet traffic, then, we need to understand the wireless edge. Measuring Wi-Fi traffic, however, is challenging. It is insufficient to capture traffic in the access points, or upstream of the access points, because the …


Anchor-Free Localization In Mixed Wireless Sensor Network Systems, Yurong Xu May 2008

Anchor-Free Localization In Mixed Wireless Sensor Network Systems, Yurong Xu

Dartmouth College Ph.D Dissertations

Recent technological advances have fostered the emergence of Wireless Sensor Networks (WSNs), which consist of tiny, wireless, battery-powered nodes that are expected to revolutionize the ways in which we understand and construct complex physical systems. A fundamental property needed to use and maintain these WSNs is ``localization'', which allows the establishment of spatial relationships among nodes over time. This dissertation presents a series of Geographic Distributed Localization (GDL) algorithms for mixed WSNs, in which both static and mobile nodes can coexist. The GDL algorithms provide a series of useful methods for localization in mixed WSNs. First, GDL provides an approximation …


Mesh-Mon: A Monitoring And Management System For Wireless Mesh Networks, Soumendra Nanda May 2008

Mesh-Mon: A Monitoring And Management System For Wireless Mesh Networks, Soumendra Nanda

Dartmouth College Ph.D Dissertations

A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for emergency response operations in areas with limited or damaged infrastructure. In this dissertation, we present Dart-Mesh: a Linux-based layer-3 dual-radio two-tiered mesh network that provides complete 802.11b coverage in the Sudikoff Lab for Computer Science at Dartmouth College. We faced several challenges in building, testing, monitoring and managing this network. These challenges motivated us to design and implement Mesh-Mon, a network monitoring …


Group-Aware Stream Filtering, Ming Li May 2008

Group-Aware Stream Filtering, Ming Li

Dartmouth College Ph.D Dissertations

Recent years have witnessed a new class of monitoring applications that need to continuously collect information from remote data sources. Those data sources, such as web click-streams, stock quotes, and sensor data, are often characterized as fast-rate high-volume ``streams''. Distributed stream-processing systems are thus designed to efficiently use system resources to serve the data-acquisition needs of the applications. Most of the state-of-the-art stream-processing systems assume an Ethernet-based network whose bandwidth is abundant, and focus on mechanisms to save computational power and memory. For applications involving wireless networks, particularly multi-hop mesh networks, we recognize that the most limiting factor in efficiently …


Evaluating Mobility Predictors In Wireless Networks For Improving Handoff And Opportunistic Routing, Libo Song Jan 2008

Evaluating Mobility Predictors In Wireless Networks For Improving Handoff And Opportunistic Routing, Libo Song

Dartmouth College Ph.D Dissertations

We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on theoretical analysis, simulation with synthetic mobility models, or small wireless network traces. We study the effect of mobility prediction for a large realistic wireless situation. We tackle the problem by using traces collected from a large production wireless network to evaluate several major families of handoff-location prediction techniques, a set of handoff-time predictors, and a predictor that jointly predicts handoff location and time. …