Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry Sep 2022

Distribution Of Dds-Cerberus Authenticated Facial Recognition Streams, Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry

Faculty Publications

Successful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However, researchers have found several security vulnerabilities in DDS implementations. DDS-Cerberus (DDS-C) is a security layer implemented into DDS to mitigate impersonation attacks using Kerberos authentication and ticketing. Even with the addition of DDS-C, the real-time message sending of DDS also needs to be upheld. This paper extends our previous work to analyze DDS-C’s impact on performance in a use case implementation. The use case covers an artificial …


A Secure And Energy-Efficient Opportunistic Routing Protocol With Void Avoidancefor Underwater Acoustic Sensor Networks, Varun Menon, Divya Midhunchakkaravarthy, Sonali John, Sunil Jacob, Amrit Mukherjee Jan 2020

A Secure And Energy-Efficient Opportunistic Routing Protocol With Void Avoidancefor Underwater Acoustic Sensor Networks, Varun Menon, Divya Midhunchakkaravarthy, Sonali John, Sunil Jacob, Amrit Mukherjee

Turkish Journal of Electrical Engineering and Computer Sciences

Recently, underwater acoustic sensor networks (UASNs) have gained wide attention due to their numerous applications in underwater surveillance, oil leakage detection, assisted navigation, and disaster prevention. With unique characteristics like increased propagation delay, constant mobility of sensor nodes, high error rate, and limitations in energy and interference, efficient routing of data packets from the source node to the destination is a major challenge in UASNs. Most of the protocols proposed for traditional sensor networks do not work well in UASNs. Although many protocols have been specifically proposed for underwater environments, the aim of most of them is to improve only …


Cada: Channel And Delay Aware Scheduler For Real-Time Applications In Wimax Networks, Melek Oktay, Haci Ali̇ Mantar Jan 2013

Cada: Channel And Delay Aware Scheduler For Real-Time Applications In Wimax Networks, Melek Oktay, Haci Ali̇ Mantar

Turkish Journal of Electrical Engineering and Computer Sciences

Scheduling is the core of the worldwide interoperability for microwave access (WiMAX) technology that directly affects the performance of the network. In this study, we focus on scheduling and present a novel algorithm called the channel and delay aware scheduler (CADA) for real-time applications, such as voice over Internet protocol, video-on-demand, and video streaming. CADA has 2 important modules: wireless and network delay monitoring tools. The wireless module, including the compensation and channel state monitoring modules, increases the network throughput and provides fairness among all of the flows in the network. The network delay monitoring tool calculates the estimated network …


Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic Oct 2012

Embedded Virtual Machines For Robust Wireless Control Systems, Rahul Mangharam, Miroslav Pajic

Rahul Mangharam

Embedded wireless networks have largely focused on open loop sensing and monitoring. To address actuation in closed loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), a …


Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh Jun 2012

Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh

Dissertations

Conventional real-time scheduling algorithms are in care of timing constraints; they don’t pay any attention to enhance or optimize the real-time packet’s security performance. In this work, we propose an adaptive security-aware scheduling with congestion control mechanism for packet switching networks using real-time agentbased systems. The proposed system combines the functionality of real-time scheduling with the security service enhancement, where the real-time scheduling unit uses the differentiated-earliest-deadline-first (Diff-EDF) scheduler, while the security service enhancement scheme adopts a congestion control mechanism based on a resource estimation methodology.

The security service enhancement unit was designed based on two models: singlelayer and weighted …


Rate-Based End-To-End Congestion Control Of Multimedia Traffic In Packet Switched Networks, Mingsheng Peng, S. R. Subramanya, Jagannathan Sarangapani Jan 2003

Rate-Based End-To-End Congestion Control Of Multimedia Traffic In Packet Switched Networks, Mingsheng Peng, S. R. Subramanya, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes an explicit rate-based end-to-end congestion control mechanism to alleviate congestion of multimedia traffic in packet switched networks such as the Internet. The congestion is controlled by adjusting the transmission rates of the sources in response to the feedback information from destination such as the buffer occupancy, packet arrival rate and service rate at the outgoing link, so that a desired quality of service (QoS) can be met. The QoS is defined in terms of packet loss ratio, transmission delay, power, and network utilization. Comparison studies demonstrate the effectiveness of the proposed scheme over New-Reno TCP (a variant …