Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AoA estimation (1)
- Attack-resilient control (1)
- BER (1)
- Beamforming (1)
- Blockchain (1)
-
- COTS (1)
- Clipping (1)
- Cloud computing (1)
- Codebook (1)
- Computational Path (1)
- Cross-layered detection (1)
- Cyber-physical system security (1)
- Data processing (1)
- Device authentication (1)
- Edge-cloud collaborative computing (1)
- Energy-Efficient (1)
- Information sharing. (1)
- Insider attacks (1)
- Interdependency (1)
- Internet of Things systems (1)
- IoT (1)
- Latency-aware Placement (1)
- MC-CDMA (1)
- MIMO (1)
- Machine learning (1)
- Microservices (1)
- Migration (1)
- Network function visualization (1)
- Neural network (1)
- Nuclear power plant (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Electronic Thesis and Dissertation Repository
Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …
Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li
Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li
Electronic Thesis and Dissertation Repository
IoT networks have already been widely deployed due to their convenience and low-cost advantage. However, due to the lack of strong self-protection mechanisms and the imperfect network architectures, many IoT devices are vulnerable to malicious cyber-attacks, which will further threaten the availability and security of IoT applications. Therefore, securing the network infrastructure while protecting data from malicious or unauthorized devices/users become a vital aspect of IoT network design. In the thesis, two types of IoT security mechanisms are mainly investigated, namely, IoT routing protection and smart community device authentication.
By adopting the distributed consensus mechanism, we propose a blockchain-based reputation …
Exploitation Of Robust Aoa Estimation And Low Overhead Beamforming In Mmwave Mimo System, Yuyan Zhao
Exploitation Of Robust Aoa Estimation And Low Overhead Beamforming In Mmwave Mimo System, Yuyan Zhao
Electronic Thesis and Dissertation Repository
The limited spectral resource for wireless communications and dramatic proliferation of new applications and services directly necessitate the exploitation of millimeter wave (mmWave) communications. One critical enabling technology for mmWave communications is multi-input multi-output (MIMO), which enables other important physical layer techniques, specifically beamforming and antenna array based angle of arrival (AoA) estimation. Deployment of beamforming and AoA estimation has many challenges. Significant training and feedback overhead is required for beamforming, while conventional AoA estimation methods are not fast or robust. Thus, in this thesis, new algorithms are designed for low overhead beamforming, and robust AoA estimation with significantly reduced …
Energy-Efficient Multicarrier And Multicarrier-Cdma Systems, Moftah Ali
Energy-Efficient Multicarrier And Multicarrier-Cdma Systems, Moftah Ali
Electronic Thesis and Dissertation Repository
Design, analysis, and performance of Multicarrier (MC) and Multicarrier-Code Division Multiple Access (MC-CDMA) systems are considered. Specifically, Multicarrier Modulation (MCM) such as Orthogonal Frequency Division Multiplexing (OFDM) is used in these systems with emphasis on energy efficiency. These systems are examined for their performances over frequency-selective and frequency-non-selective channels. Methods are proposed for reduction of energy costs of an OFDM system. They are: i) Clipping (CL) based on symbol statistics; ii) Partial Transmit Sequence (PTS) using Magic square pattern and adjacent partitioning; and iii) Selective Mapping (SLM) and Tone Reservation (TR) with reduced complexity. These methods are described and algorithms …
Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu
Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu
Electronic Thesis and Dissertation Repository
Based on the evolving communications, computing and embedded systems technologies, Internet of Things (IoT) systems can interconnect not only physical users and devices but also virtual services and objects, which have already been applied to many different application scenarios, such as smart home, smart healthcare, and intelligent transportation. With the rapid development, the number of involving devices increases tremendously. The huge number of devices and correspondingly generated data bring critical challenges to the IoT systems. To enhance the overall performance, this thesis aims to address the related technical issues on IoT data processing and physical topology discovery of the subnets …
Analysis, Design And Demonstration Of Control Systems Against Insider Attacks In Cyber-Physical Systems, Xirong Ning
Analysis, Design And Demonstration Of Control Systems Against Insider Attacks In Cyber-Physical Systems, Xirong Ning
Electronic Thesis and Dissertation Repository
This dissertation aims to address the security issues of insider cyber-physical attacks and provide a defense-in-depth attack-resilient control system approach for cyber-physical systems.
Firstly, security analysis for cyber-physical systems is investigated to identify potential risks and potential security enhancements. Vulnerabilities of the system and existing security solutions, including attack prevention, attack detection and attack mitigation strategies are analyzed.
Subsequently, a methodology to analyze and mathematically characterize insider attacks is developed. An attack pattern is introduced to represent key features in an insider cyber-physical attack, which includes attack goals, resources, constraints, modes, as well as probable attack paths. Patterns for such …
Investigation Of Radiation-Hardened Design Of Electronic Systems With Applications To Post-Accident Monitoring For Nuclear Power Plants, Qiang Huang
Electronic Thesis and Dissertation Repository
This research aims at improving the robustness of electronic systems used-in high level radiation environments by combining with radiation-hardened (rad-hardened) design and fault-tolerant techniques based on commercial off-the-shelf (COTS) components. A specific of the research is to use such systems for wireless post-accident monitoring in nuclear power plants (NPPs). More specifically, the following methods and systems are developed and investigated to accomplish expected research objectives: analysis of radiation responses, design of a radiation-tolerant system, implementation of a wireless post-accident monitoring system for NPPs, performance evaluation without repeat physical tests, and experimental validation in a radiation environment.
A method is developed …