Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Computer Engineering

Theses/Dissertations

Security

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Modeling Autonomous Vehicles Through Radio Controlled Cars, Eva S. Chen Jun 2017

Modeling Autonomous Vehicles Through Radio Controlled Cars, Eva S. Chen

Computer Engineering

Autonomous vehicles have a lot of potential in improving people’s everyday lives. They could reduce congestion, reduce collisions, enhance mobility, and more. But with these benefits come security and privacy risks. In order to research and test some of these risks, we are building a set of scale autonomous cars that can model autonomous and collaborative behaviors. One such behaviour would be platooning, where a group of vehicles can travel closely together at high speeds by following a lead car. We are doing this with various sensors and control algorithms to allow for future modularity.


Wireless Network Intrusion Detection System, Calvin Jia Liang May 2014

Wireless Network Intrusion Detection System, Calvin Jia Liang

Computer Engineering

The Wireless Network Intrusion Detection System is a network-based intrusion detection system (IDS) that listens on a wireless network. The IDS device is a self-contained single-board-computer capable of monitoring the user’s wireless network, detecting suspicious network traffic, and reporting to the user via email. The device has two network interfaces: the wireless interface is used to monitor network traffic, and the wired interface is used to configure the system and to send out detection alerts. The system requires minimal setup, configuration, and maintenance. It is a relatively inexpensive device that tries to improve user’s situational-awareness of one’s wireless network.