Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li Nov 2019

Blockchain-Based Distributed Network Architecture For Internet Of Things, Min Li

Electronic Thesis and Dissertation Repository

IoT networks have already been widely deployed due to their convenience and low-cost advantage. However, due to the lack of strong self-protection mechanisms and the imperfect network architectures, many IoT devices are vulnerable to malicious cyber-attacks, which will further threaten the availability and security of IoT applications. Therefore, securing the network infrastructure while protecting data from malicious or unauthorized devices/users become a vital aspect of IoT network design. In the thesis, two types of IoT security mechanisms are mainly investigated, namely, IoT routing protection and smart community device authentication.

By adopting the distributed consensus mechanism, we propose a blockchain-based reputation …


Exploitation Of Robust Aoa Estimation And Low Overhead Beamforming In Mmwave Mimo System, Yuyan Zhao Nov 2019

Exploitation Of Robust Aoa Estimation And Low Overhead Beamforming In Mmwave Mimo System, Yuyan Zhao

Electronic Thesis and Dissertation Repository

The limited spectral resource for wireless communications and dramatic proliferation of new applications and services directly necessitate the exploitation of millimeter wave (mmWave) communications. One critical enabling technology for mmWave communications is multi-input multi-output (MIMO), which enables other important physical layer techniques, specifically beamforming and antenna array based angle of arrival (AoA) estimation. Deployment of beamforming and AoA estimation has many challenges. Significant training and feedback overhead is required for beamforming, while conventional AoA estimation methods are not fast or robust. Thus, in this thesis, new algorithms are designed for low overhead beamforming, and robust AoA estimation with significantly reduced …


Energy-Efficient Multicarrier And Multicarrier-Cdma Systems, Moftah Ali Nov 2019

Energy-Efficient Multicarrier And Multicarrier-Cdma Systems, Moftah Ali

Electronic Thesis and Dissertation Repository

Design, analysis, and performance of Multicarrier (MC) and Multicarrier-Code Division Multiple Access (MC-CDMA) systems are considered. Specifically, Multicarrier Modulation (MCM) such as Orthogonal Frequency Division Multiplexing (OFDM) is used in these systems with emphasis on energy efficiency. These systems are examined for their performances over frequency-selective and frequency-non-selective channels. Methods are proposed for reduction of energy costs of an OFDM system. They are: i) Clipping (CL) based on symbol statistics; ii) Partial Transmit Sequence (PTS) using Magic square pattern and adjacent partitioning; and iii) Selective Mapping (SLM) and Tone Reservation (TR) with reduced complexity. These methods are described and algorithms …


Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu Aug 2019

Data Analytics And Performance Enhancement In Edge-Cloud Collaborative Internet Of Things Systems, Tianqi Yu

Electronic Thesis and Dissertation Repository

Based on the evolving communications, computing and embedded systems technologies, Internet of Things (IoT) systems can interconnect not only physical users and devices but also virtual services and objects, which have already been applied to many different application scenarios, such as smart home, smart healthcare, and intelligent transportation. With the rapid development, the number of involving devices increases tremendously. The huge number of devices and correspondingly generated data bring critical challenges to the IoT systems. To enhance the overall performance, this thesis aims to address the related technical issues on IoT data processing and physical topology discovery of the subnets …


Analysis, Design And Demonstration Of Control Systems Against Insider Attacks In Cyber-Physical Systems, Xirong Ning Jun 2019

Analysis, Design And Demonstration Of Control Systems Against Insider Attacks In Cyber-Physical Systems, Xirong Ning

Electronic Thesis and Dissertation Repository

This dissertation aims to address the security issues of insider cyber-physical attacks and provide a defense-in-depth attack-resilient control system approach for cyber-physical systems.

Firstly, security analysis for cyber-physical systems is investigated to identify potential risks and potential security enhancements. Vulnerabilities of the system and existing security solutions, including attack prevention, attack detection and attack mitigation strategies are analyzed.

Subsequently, a methodology to analyze and mathematically characterize insider attacks is developed. An attack pattern is introduced to represent key features in an insider cyber-physical attack, which includes attack goals, resources, constraints, modes, as well as probable attack paths. Patterns for such …


Investigation Of Radiation-Hardened Design Of Electronic Systems With Applications To Post-Accident Monitoring For Nuclear Power Plants, Qiang Huang Feb 2019

Investigation Of Radiation-Hardened Design Of Electronic Systems With Applications To Post-Accident Monitoring For Nuclear Power Plants, Qiang Huang

Electronic Thesis and Dissertation Repository

This research aims at improving the robustness of electronic systems used-in high level radiation environments by combining with radiation-hardened (rad-hardened) design and fault-tolerant techniques based on commercial off-the-shelf (COTS) components. A specific of the research is to use such systems for wireless post-accident monitoring in nuclear power plants (NPPs). More specifically, the following methods and systems are developed and investigated to accomplish expected research objectives: analysis of radiation responses, design of a radiation-tolerant system, implementation of a wireless post-accident monitoring system for NPPs, performance evaluation without repeat physical tests, and experimental validation in a radiation environment.

A method is developed …