Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Security

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed Aug 2019

Robust Resource Allocation To Secure Physical Layer Using Uav-Assisted Mobile Relay Communications In 5g Technology, Shakil Ahmed

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next generation researchers due to their flexible, dynamic, and cost-effective deployment, etc. Moreover, the UAVs have a wide range of application domains, such as rescue operation in the remote area, military surveillance, emergency application, etc. Given the UAVs are appropriately deployed, the UAVs provide continuous and reliable connectivity, on-demand, and cost-effective features to the desired destination in the wireless communication system. Thus, the UAVs can be a great choice to deploy as a mobile relay in co-existence with the base stations (BSs) on the ground …


Security Of Vehicular Platooning, Soodeh Dadras May 2019

Security Of Vehicular Platooning, Soodeh Dadras

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Platooning concept involves a group of vehicles acting as a single unit through coordination of movements. While Platooning as an evolving trend in mobility and transportation diminishes the individual and manual driving concerns, it creates new risks. New technologies and passenger’s safety and security further complicate matters and make platooning attractive target for the malicious minds. To improve the security of the vehicular platooning, threats and their potential impacts on vehicular platooning should be identified to protect the system against security risks. Furthermore, algorithms should be proposed to detect intrusions and mitigate the effects in case of attack. This dissertation …


Platform Development And Path Following Controller Design For Full-Sized Vehicle Automation, Austin D. Costley May 2017

Platform Development And Path Following Controller Design For Full-Sized Vehicle Automation, Austin D. Costley

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The purpose of this thesis is to discuss the design and development of a platform used to automate a stock 2013 Ford Focus EV. The platform is low-cost and open-source to encourage collaboration and provide a starting point for fellow researchers to advance the work in the field of automated vehicle control. This thesis starts by discussing the process of obtaining control of the vehicle by taking advantage of internal communication protocols. The controller design process is detailed and a description of the components and software used to control the vehicle is provided. The automated system is tested and the …


Ground Vehicle Platooning Control And Sensing In An Adversarial Environment, Samuel A. Mitchell May 2016

Ground Vehicle Platooning Control And Sensing In An Adversarial Environment, Samuel A. Mitchell

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

In the past few years, automated cars have ceased to be part of science fiction, and have instead become a technology that has been implemented, with partially automated systems currently available to customers.

One benefit of automated vehicle technology is the consistent driving patterns due to automation, instead of the inconsistency of distractible humans. Passengers of automated vehicles will be exposed to much less danger than the passengers of human-driven vehicles.

These statements will only be true as automated vehicle systems are scrutinized by experts to find flaws in the system. Security enthusiasts have already hijacked control of an automated …


Runtime Detection Of A Bandwidth Denial Attack From A Rogue Network-On-Chip, Rajesh Jayashankarashridevi May 2015

Runtime Detection Of A Bandwidth Denial Attack From A Rogue Network-On-Chip, Rajesh Jayashankarashridevi

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Chips with high computational power are the crux of today’s pervasive complex digital systems. Microprocessor circuits are evolving towards many core designs with the integration of hundreds of processing cores, memory elements and other devices on a single chip to sustain high performance computing while maintaining low design costs. Two decisive paradigm shifts in the semiconductor industry have made this evolution possible: (a) architectural and (b) organizational.

At the heart of the architectural innovation is a scalable high speed data communication structure, the network-on-chip (NoC). NoC is an interconnect network for the glueless integration of on-chip components in the …