Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (2)
- Capability (1)
- Computational delay (1)
- Computer response time (1)
- Computer science (1)
-
- Controller (1)
- DSRC (1)
- Data Path security (1)
- Deny-by-default (1)
- Dinar (1)
- Diorama (1)
- Disaster response (1)
- Distributed Detection (1)
- I/Q Imbalance (1)
- IEEE 802.11p (1)
- Low-power (1)
- MAC (1)
- Mobile (1)
- Multi-hop (1)
- Multiple-missile multiple-target system (1)
- NS-2 (1)
- Netfpga (1)
- Network Security (1)
- Network management (1)
- Optical networks (1)
- Pacing (1)
- Packet Drop (1)
- Physical Layer Security (1)
- Security (1)
- Security Model (1)
Articles 1 - 8 of 8
Full-Text Articles in Engineering
A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu
A Study Of The Impact Of Computational Delays In Missile Interception Systems, Ye Xu
Masters Theses 1911 - February 2014
Most publications discussing missile interception systems assume a zero computer response time. This thesis studies the impact of computer response time on single-missile single-target and multiple- missile multiple-target systems. Simulation results for the final miss distance as the computer response time increases are presented. A simple online cooperative adjustment model for multiple-missile multiple-target system is created for the purpose of studying the computer delay effect.
Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai
Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai
Masters Theses 1911 - February 2014
The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique …
Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee
Simulating A Universal Geocast Scheme For Vehicular Ad Hoc Networks, Benjamin L. Bovee
Masters Theses 1911 - February 2014
Recently a number of communications schemes have been proposed for Vehicular Ad hoc Networks (VANETs). One of these, the Universal Geocast Scheme (UGS) proposed by Hossein Pishro-Nik and Mohammad Nekoui, provides for a diverse variety of VANET-specific characteristics such as time-varying topology, protocol variation based on road congestion, and support for non line-of-sight communication. In this research, the UGS protocol is extended to consider inter-vehicle multi-hop connections in intersections with surrounding obstructions along with single-hop communications in an open road scenario. Since UGS is a probabilistic, repetition-based scheme, it supports the capacity-delay tradeoffs crucial for periodic safety message exchange. The …
Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang
Addressing/Exploiting Transceiver Imperfections In Wireless Communication Systems, Lihao Wang
Masters Theses 1911 - February 2014
This thesis consists of two research projects on wireless communication systems. In the first project, we propose a fast inphase and quadrature (I/Q) imbalance compensation technique for the analog quadrature modulators in direct conversion transmitters. The method needs no training sequence, no extra background data gathering process and no prior perfect knowledge of the envelope detector characteristics. In contrast to previous approaches, it uses points from both the linear and predictable nonlinear regions of the envelope detector to hasten convergence. We provide a least mean square (LMS) version and demonstrate that the quadrature modulator compensator converges.
In the second project, …
Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson
Leveraging Multi-Radio Communication For Mobile Wireless Sensor Networks, Jeremy J. Gummeson
Masters Theses 1911 - February 2014
An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node mobility. In this thesis, we argue that the pairing of two complementary radios with heterogeneous range characteristics enables greater range and interference diversity at lower energy cost than a single radio. We make three contributions towards the design of such multi-radio mobile sensor systems. First, we present the design of a novel reinforcement learning-based link layer algorithm that continually learns channel characteristics and dynamically decides when to switch between radios. Second, we describe a …
Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki
Hardware Implementation Of Queue Length Based Pacing On Netfpga, Abhishek Dwaraki
Masters Theses 1911 - February 2014
Optical packet switching networks are the foundation for next generation high speed Internet and are fast becoming the norm rather than an option. When such high speed optical networks are taken into account, one of the key considerations is packet buffering. The importance of packet buffering plays an even bigger role in optical networks because of the physical and technological constraints on the buffer sizes that can be implemented. Existing protocols, in many real world scenarios do not perform well in such networks. To eliminate such scenarios where there is a high possibility of packet loss, we use packet pacing. …
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande
Web-Dinar: Web Based Diagnosis Of Network And Application Resources In Disaster Response Systems, Kartik Deshpande
Masters Theses 1911 - February 2014
Disaster management and emergency response mechanisms are coming of age post 9/11. Paper based triaging and evacuation is slowly being replaced with much advanced mechanisms using remote clients (Laptops, Thin clients, PDAs), RFiDs etc. This reflects a modern trend to deploy Information Technology (IT) in disaster management. IT elements provide a great a deal of flexibility and seamlessness in the communication of information. The information flowing is so critical that, loss of data is not at all acceptable. Loss of data would mean loss of critical medical information portraying the disaster scenario. This would amount to a wrong picture being …
Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan
Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan
Masters Theses 1911 - February 2014
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high performance implementation of such a network is an efficient design of the credentials that are carried in the packet and the verification procedure on the router. A network protocol that implements data path credentials based on Bloom filters is presented in this thesis. Our prototype implementation shows …