Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

End-hosts on wireless ad hoc networks typically use TCP as their transport layer protocol. Being designed for wired networks, TCP can perform poorly over wireless networks. Work that has proposed ways to improve TCP performance over wireless networks has concentrated primarily on improving TCP throughput only. Emerging applications, such as interactive multimedia and network games, require reduced delay at least as much as increased throughput. In this paper, we propose LDM1, an IP layer queue marking mechanism that estimates the number of hops and flows at each wireless node to computes the optimal marking probability. We present simulation results and …


Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

The TCP-Friendly Rate Control (TFRC) is used as a streaming media transport protocol. Using the TCP congestion response function and current network conditions, TFRC adjusts its transmission rate to yield the maximum TCP-Friendly throughput when sharing capacity with TCP flows. Since TFRC was designed for wired networks, it does not achieve the maximum TCP-Friendly throughput in multihop ad hoc wireless networks. The reduced wireless spatial channel reuse due to hidden terminals in multihop wireless networks induces TFRC throughput reductions. Specifically, TFRC is unaware of MAC layer transmission delays due to collisions, retransmissions and MAC layer congestion. This paper illustrates that …


Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz Jun 2015

Location Privacy For Mobile Crowd Sensing Through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, David Kotz

Dartmouth Scholarship

Opportunistic sensing allows applications to “task” mobile devices to measure context in a target region. For example, one could leverage sensor-equipped vehicles to measure traffic or pollution levels on a particular street or users' mobile phones to locate (Bluetooth-enabled) objects in their vicinity. In most proposed applications, context reports include the time and location of the event, putting the privacy of users at increased risk: even if identifying information has been removed from a report, the accompanying time and location can reveal sufficient information to de-anonymize the user whose device sent the report. We propose and evaluate a novel spatiotemporal …


Optical Sensing System Based On Wireless Paired Emitter Detector Diode Device And Ionogels For Lab-On-A-Disc Water Quality Analysis, Monika Czugala, Robert Gorkin Iii, Thomas Phelan, Jennifer Gaughran, Vincenzo Curto, Jens Ducree, Dermot Diamond, Fernando Benito-Lopez Jun 2015

Optical Sensing System Based On Wireless Paired Emitter Detector Diode Device And Ionogels For Lab-On-A-Disc Water Quality Analysis, Monika Czugala, Robert Gorkin Iii, Thomas Phelan, Jennifer Gaughran, Vincenzo Curto, Jens Ducree, Dermot Diamond, Fernando Benito-Lopez

Robert Gorkin III

This work describes the first use of a wireless paired emitter detector diode device (PEDD) as an optical sensor for water quality monitoring in a lab-on-a-disc device. The microfluidic platform, based on an ionogel sensing area combined with a low-cost optical sensor, is applied for quantitative pH and qualitative turbidity monitoring of water samples at point-of-need. The autonomous capabilities of the PEDD system, combined with the portability and wireless communication of the full device, provide the flexibility needed for on-site water testing. Water samples from local fresh and brackish sources were successfully analysed using the device, showing very good correlation …


Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz Feb 2015

Data Citation Practices In The Crawdad Wireless Network Data Archive, Tristan Henderson, David Kotz

Dartmouth Scholarship

CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth) is a popular research data archive for wireless network data, archiving over 100 datasets used by over 6,500 users. In this paper we examine citation behaviour amongst 1,281 papers that use CRAWDAD datasets. We find that (in general) paper authors cite datasets in a manner that is sufficient for providing credit to dataset authors and also provides access to the datasets that were used. Only 11.5% of papers did not do so; common problems included (1) citing the canonical papers rather than the dataset, (2) describing the dataset using unclear identifiers, …


Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme Jan 2015

Eavesdropping On The Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, Christopher Holme

Clinton Carpene

An in-situ deployment of smart grid technology, from meters through to access points and wider grid connectivity, was examined. The aim of the research was to determine what vulnerabilities were inherent in this deployment, and what other consideration issues may have led to further vulnerability in the system. It was determined that there were numerous vulnerabilities embedded in both hardware and software and that configuration issues further compounded these vulnerabilities. The cyber threat against critical infrastructure has been public knowledge for several years, and with increasing awareness, attention and resource being devoted to protecting critical in the structure, it is …


Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley Jan 2015

Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley

The Hilltop Review

In Wi-Fi location determination literature, little attention is paid to locations that do not have numeric, geometric coordinates, though many users prefer the convenience of non-coordinate locations (consider the ease of giving a street address as opposed to giving latitude and longitude). It is not often easy to tell from the title or abstract of a Wi-Fi location determination article whether or not it has applicability to semantic locations such as room-level names. This article surveys the literature through 2011 on Wi-Fi localization for symbolic locations.


The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2015

The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Information Security Management Conference

Mobile Ad Hoc Networks (MANETS) promise much in the ability to rapidly deploy a wireless network in a fashion where no prior planning is needed and the network can be running efficiently and with high security within minutes. Natural disaster response, military, education and business provide areas where MANETS can offer significant advantages in communication where infrastructure networks may take days to set up or may be impossible to implement. This research reviews a selection of MANET protocols to show the progression of the research and the issues that are yet to be addressed. It discusses the challenges to researchers …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …