3,792 research outputs found

    Routing and Security in Mobile Ad Hoc Networks

    Get PDF
    A Mobile Ad hoc Network (MANET) consists of a set of nodes which can form a network among themselves. MANETs have applications in areas such as military, disaster rescue operations, monitoring animal habitats, etc. where establishing fixed communication infrastructure is not feasible. Routing protocols designed for MANETs can be broadly classified as position-based (geographic), topology-based and hybrid. Geographic routing uses location information of nodes to route messages. Topology-based routing uses network state information for route discovery and maintenance. Hybrid routing protocols use features in both position-based and topology-based approaches. Position-based routing protocols route packets towards the destination using greedy forwarding (i.e., an intermediate node forwards packets to a neighbor that is closer to the destination than itself). If a node has no neighbor that is closer to the destination than itself, greedy forwarding fails. In this case, we say there is void. Different position-based routing protocols use different methods for dealing with voids. Topology-based routing protocols can be classified into on-demand (reactive) routing protocols and proactive routing protocols. Generally, on-demand routing protocols establish routes when needed by flooding route requests throughout the entire network, which is not a scalable approach. Reactive routing protocols try to maintain routes between every pair of nodes by periodically exchanging messages with each other which is not a scalable approach also. This thesis addresses some of these issues and makes the following contribution. First, we present a position-based routing protocol called Greedy Routing Protocol with Backtracking (GRB) which uses a simple backtracking technique to route around voids, unlike existing position-based routing protocols which construct planarized graph of the local network to route around voids. We compare the performance of our protocol with the well known Greedy Perimeter Stateless Routing (GPSR) protocol and the Ad-Hoc On-demand Distance Vector (AODV) routing protocol as well as the Dynamic Source Routing (DSR) protocol. Performance evaluation shows that our protocol has less control overhead than those of DSR, AODV, and GPSR. Performance evaluation also shows that our protocol has a higher packet-delivery ratio, lower end-to-end delay, and less hop count, on average, compared to AODV, DSR and GPSR. We then present an on-demand routing protocol called ``Hybrid On-demand Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks which uses greedy approach for route discovery. This prevents flooding route requests, unlike the existing on-demand routing protocols. This approach also helps in finding routes that have lower hop counts than AODV and DSR. Our performance evaluation confirms that our protocol performs better than AODV and DSR, on average, with respect to hop count, packet-delivery ratio and control overhead. In MANETs, all nodes need to cooperate to establish routes. Establishing secure and valid routes in the presence of adversaries is a challenge in MANETs. Some of the well-known source routing protocols presented in the literature (e.g., Ariadne and endairA) which claim to establish secure routes are susceptible to hidden channel attacks. We address this issue and present a secure routing protocol called SAriadne, based on sanitizable signatures. We show that our protocol detects and prevents hidden channel attacks

    Art-Entrepreneurship In The Music Business

    Get PDF
    Master's thesis in Music management (MU501

    The Vulnerability of Subsea Infrastructure to Underwater Attack: Legal Shortcomings and the Way Forward

    Get PDF
    This Article explores the vulnerability of submarine pipelines and cables to underwater subterfuge beyond territorial waters, particularly with regards to the emerging threat posed by unmanned vehicles in executing such mal intent. Next, it describes the legal status of this critical infrastructure before identifying shortcomings in legal protection from underwater attack. Finally, potential solutions are offered for the way forward

    Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks

    Get PDF
    Precision Farming Has a Positive Potential in the Agricultural Industry Regarding Water Conservation, Increased Productivity, Better Development of Rural Areas, and Increased Income. Blockchain Technology is a Better Alternative for Storing and Sharing Farm Data as It is Reliable, Transparent, Immutable, and Decentralized. Remote Monitoring of an Agricultural Field Requires Security Systems to Ensure that Any Sensitive Information is Exchanged Only among Authenticated Entities in the Network. to This End, We Design an Efficient Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural Internet of Things (IoT) Networks Called AgroMobiBlock. the Limited Existing Work on Authentication in Agricultural Networks Shows Passive Usage of Blockchains with Very High Costs. AgroMobiBlock Proposes a Novel Idea using the Elliptic Curve Operations on an Active Hybrid Blockchain over Mobile Farming Vehicles with Low Computation and Communication Costs. Formal and Informal Security Analysis Along with the Formal Security Verification using the Automated Validation of Internet Security Protocols and Applications (AVISPA) Software Tool Have Shown the Robustness of AgroMobiBlock Against Man-In-The-Middle, Impersonation, Replay, Physical Capture, and Ephemeral Secret Leakage Attacks among Other Potential Attacks. the Blockchain-Based Simulation on Large-Scale Nodes Shows the Computational Time for an Increase in the Network and Block Sizes. Moreover, the Real-Time Testbed Experiments Have Been Performed to Show the Practical Usefulness of the Proposed Scheme

    The Public Service Media and Public Service Internet Manifesto

    Get PDF
    This open access book presents the collectively authored Public Service Media and Public Service Internet Manifesto and accompanying materials. The Manifesto can be signed by visiting http://bit.ly/signPSManifesto The Internet and the media landscape are broken. The dominant commercial Internet platforms endanger democracy. They have created a communications landscape overwhelmed by surveillance, advertising, fake news, hate speech, conspiracy theories, and algorithmic politics. Commercial Internet platforms have harmed citizens, users, everyday life, and society. Democracy and digital democracy require Public Service Media. A democracy-enhancing Internet requires Public Service Media becoming Public Service Internet platforms – an Internet of the public, by the public, and for the public; an Internet that advances instead of threatens democracy and the public sphere. The Public Service Internet is based on Internet platforms operated by a variety of Public Service Media, taking the public service remit into the digital age. The Public Service Internet provides opportunities for public debate, participation, and the advancement of social cohesion. Accompanying the Manifesto are materials that informed its creation: Christian Fuchs’ report of the results of the Public Service Media/Internet Survey, the written version of Graham Murdock’s online talk on public service media today, and a summary of an ecomitee.com discussion of the Manifesto’s foundations. Table of Contents Chapter 1: Introduction Christian Fuchs and Klaus Unterberger Chapter 2: The Public Service Media and Public Service Internet Manifesto Chapter 3: The Public Service Media and Public Service Internet Utopias Survey Report Christian Fuchs Chapter 4: Public Service Media for Critical Times: Connectivity, Climate, and Corona Graham Murdock Chapter 5: The Future of Public Service Media and the Internet Alessandro D’Arma, Christian Fuchs, Minna Horowitz and Klaus Unterberge

    You don't have to be a bad girl to love crime: feminity and women's labor in U.S. broadcast crime programming, 1945-1975

    Get PDF
    You Don’t Have to Be a Bad Girl to Love Crime uses archival research, textual analysis, and industrial and cultural studies frameworks to re-evaluate women’s representation in post-World War II American radio and television crime dramas. It complicates popular and scholarly understandings that postwar broadcasters simply responded to audience desires by marginalizing women across their schedules and removing recurring female characters from crime dramas altogether. Rather, the three major networks (NBC, CBS, and ABC) that dominated the broadcast industry’s transition from radio to television joined conservative religious and anti-communist groups to silence public debate over women’s roles. While late-1940s network radio programming incorporated varied opinions about postwar women’s desire and potential to expand their influence in the workplace and politics, postwar television naturalized a vision of passive housewives embracing husbands’ patriarchal authority. Women who chose to fight crime challenged this authority by claiming the right to enforce the law and judge their fellow citizens. This dissertation is organized into two parts: The first explores the industrial and cultural discourses that set the stage for postwar restrictions on women in crime. Network executives and anti-communist conservatives did not see each other as natural allies, but they mobilized complementary gender discourses emphasizing women as passive consumers rather than public actors. Archival industry research shows network executives ignored evidence female audiences liked crime programming, especially series featuring active, sympathetic women. Instead, executives and vocal conservatives framed such women as a sexualized threat to men, children, and themselves. Networks tolerated crime-curious women on radio and early television, when they struggled to retain and build a female audience. However, by the mid-1950s, executives feared such women would undermine their commercial emphasis on domestic consumption and attract regulation or censorship. Part two explores three major types of crime-curious women who appeared on postwar radio and television programming. Investigative wives and detectives’ secretaries investigated crimes with male husbands or employers. Female detectives, however, directly challenged men’s control over criminal justice, the most overt sign of patriarchal social power. All three types gave female audiences a powerful model of feminine agency within patriarchal society. They also established representational norms that endure in modern crime dramas
    • …
    corecore