6,231 research outputs found
Mobility and Address Freedom in AllNet
Mobile devices can be addressed through a variety of means.
We propose that each device select its own addresses, we
motivate this choice, and we describe mechanisms for deliv-
ering data using these addresses.
Hierarchical point-of-attachment addresses are not effec-
tive with mobile devices. The network has to maintain a
global mapping between addresses and locations whether or
not the address is topological. Since this mapping is needed
anyway, there is not much point in having the structure of the
address encode device location. Instead, we have designed
a network protocol, AllNet, to support self-selected address-
ing. When data is transmitted over the Internet, a Distributed
Hash Table (DHT) provides a connection between senders
and and receivers.
The advantages of self-selected addresses include the abil-
ity of devices to join and form a network without any need
for prior agreement, and the ability to choose a personal,
memorable address. When multiple devices choose the same
address another mechanism, such as signed and encrypted
messages, provides the necessary disambiguation
Implementation of an identity based encryption sub-system for secure e-mail and other applications
This thesis describes the requirements for, and design of, a suite of a sub-systems which support the introduction of Identity Based Encryption (IBE) to Intrenet communications.
Current methods for securing Internet transmission are overly complex to users and require expensive and complex supporting infrastructure for distributing credentials such
as certificates or public keys. Identity Based Encryption holds a promise of simplifying the process without compromising the security. In this thesis I will outline the theory behind the cryptography required , give a background to e-M ail and messaging protocols,the current security methods, the infrastructure used, the issues with these methods, and the break through that recent innovations in Identity Based Encryption hopes to deliver.I will describe an implementation of a sub-system that secures e-Mail and other protocolsin desktop platforms with as little impact on the end user as possible
Satisfying STEM Education Using the Arduino Microprocessor in C Programming
There exists a need to promote better Science Technology Engineering and Math (STEM) education at the high school level. To satisfy this need a series of hands-on laboratory assignments were created to be accompanied by 2 educational trainers that contain various electronic components. This project provides an interdisciplinary, hands-on approach to teaching C programming that meets several standards defined by the Tennessee Board of Education. Together the trainers and lab assignments also introduce key concepts in math and science while allowing students hands-on experience with various electronic components. This will allow students to mimic real world applications of using the C programming language while exposing them to technology not currently introduced in many high school classrooms. The developed project is targeted at high school students performing at or above the junior level and uses the Arduino Mega open-source Microprocessor and software as the primary control unit
- …