31 research outputs found

    LER-GR: Location Error Resilient Geographical Routing for Vehicular Ad-hoc Networks

    Get PDF
    The efficiency and scalability of geographical routing depend on the accuracy of location information of vehicles. Each vehicle determines its location using Global Positioning System (GPS) or other positioning systems. Related literature in geographical routing implicitly assumes accurate location information. However, this assumption is unrealistic considering the accuracy limitation of GPS and obstruction of signals by road side environments. The inaccurate location information results in performance degradation of geographical routing protocols in vehicular environments. In this context, this paper proposes a location error resilient geographical routing (LER-GR) protocol. Rayleigh distribution based error calculation technique is utilized for assessing error in the location of neighbouring vehicles. Kalman filter based location prediction and correction technique is developed to predict the location of the neighbouring vehicles. The next forwarding vehicle (NFV) is selected based on the least error in location information. Simulations are carried out to evaluate the performance of LER-GR in realistic environments, considering junction-based as well as real map-based road networks. The comparative performance evaluation attests the location error resilient capability of LER-GR in a vehicular environment

    Priority-Based Content Delivery in the Internet of Vehicles through Named Data Networking

    Get PDF
    Named Data Networking (NDN) has been recently proposed as a prominent solution for content delivery in the Internet of Vehicles (IoV), where cars equipped with a variety of wireless communication technologies exchange information aimed to support safety, traffic efficiency, monitoring and infotainment applications. The main NDN tenets, i.e., name-based communication and in-network caching, perfectly fit the demands of time- and spatially-relevant content requested by vehicles regardless of their provenance. However, existing vehicular NDN solutions have not been targeted to wisely ensure prioritized traffic treatment based on the specific needs of heterogeneous IoV content types. In this work, we propose a holistic NDN solution that, according to the demands of data traffic codified in NDN content names, dynamically shapes the NDN forwarding decisions to ensure the appropriate prioritization. Specifically, our proposal first selects the outgoing interface(s) (i.e., 802.11, LTE) for NDN packets and then properly tunes the timing of the actual transmissions. Simulation results show that the proposed enhancements succeed in achieving differentiated traffic treatment, while keeping traffic load under control

    Internet of Underwater Things and Big Marine Data Analytics -- A Comprehensive Survey

    Full text link
    The Internet of Underwater Things (IoUT) is an emerging communication ecosystem developed for connecting underwater objects in maritime and underwater environments. The IoUT technology is intricately linked with intelligent boats and ships, smart shores and oceans, automatic marine transportations, positioning and navigation, underwater exploration, disaster prediction and prevention, as well as with intelligent monitoring and security. The IoUT has an influence at various scales ranging from a small scientific observatory, to a midsized harbor, and to covering global oceanic trade. The network architecture of IoUT is intrinsically heterogeneous and should be sufficiently resilient to operate in harsh environments. This creates major challenges in terms of underwater communications, whilst relying on limited energy resources. Additionally, the volume, velocity, and variety of data produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise to the concept of Big Marine Data (BMD), which has its own processing challenges. Hence, conventional data processing techniques will falter, and bespoke Machine Learning (ML) solutions have to be employed for automatically learning the specific BMD behavior and features facilitating knowledge extraction and decision support. The motivation of this paper is to comprehensively survey the IoUT, BMD, and their synthesis. It also aims for exploring the nexus of BMD with ML. We set out from underwater data collection and then discuss the family of IoUT data communication techniques with an emphasis on the state-of-the-art research challenges. We then review the suite of ML solutions suitable for BMD handling and analytics. We treat the subject deductively from an educational perspective, critically appraising the material surveyed.Comment: 54 pages, 11 figures, 19 tables, IEEE Communications Surveys & Tutorials, peer-reviewed academic journa

    Mecanismos dinâmicos de segurança para redes softwarizadas e virtualizadas

    Get PDF
    The relationship between attackers and defenders has traditionally been asymmetric, with attackers having time as an upper hand to devise an exploit that compromises the defender. The push towards the Cloudification of the world makes matters more challenging, as it lowers the cost of an attack, with a de facto standardization on a set of protocols. The discovery of a vulnerability now has a broader impact on various verticals (business use cases), while previously, some were in a segregated protocol stack requiring independent vulnerability research. Furthermore, defining a perimeter within a cloudified system is non-trivial, whereas before, the dedicated equipment already created a perimeter. This proposal takes the newer technologies of network softwarization and virtualization, both Cloud-enablers, to create new dynamic security mechanisms that address this asymmetric relationship using novel Moving Target Defense (MTD) approaches. The effective use of the exploration space, combined with the reconfiguration capabilities of frameworks like Network Function Virtualization (NFV) and Management and Orchestration (MANO), should allow for adjusting defense levels dynamically to achieve the required security as defined by the currently acceptable risk. The optimization tasks and integration tasks of this thesis explore these concepts. Furthermore, the proposed novel mechanisms were evaluated in real-world use cases, such as 5G networks or other Network Slicing enabled infrastructures.A relação entre atacantes e defensores tem sido tradicionalmente assimétrica, com os atacantes a terem o tempo como vantagem para conceberem uma exploração que comprometa o defensor. O impulso para a Cloudificação do mundo torna a situação mais desafiante, pois reduz o custo de um ataque, com uma padronização de facto sobre um conjunto de protocolos. A descoberta de uma vulnerabilidade tem agora um impacto mais amplo em várias verticais (casos de uso empresarial), enquanto anteriormente, alguns estavam numa pilha de protocolos segregados que exigiam uma investigação independente das suas vulnerabilidades. Além disso, a definição de um perímetro dentro de um sistema Cloud não é trivial, enquanto antes, o equipamento dedicado já criava um perímetro. Esta proposta toma as mais recentes tecnologias de softwarização e virtualização da rede, ambas facilitadoras da Cloud, para criar novos mecanismos dinâmicos de segurança que incidem sobre esta relação assimétrica utilizando novas abordagens de Moving Target Defense (MTD). A utilização eficaz do espaço de exploração, combinada com as capacidades de reconfiguração de frameworks como Network Function Virtualization (NFV) e Management and Orchestration (MANO), deverá permitir ajustar dinamicamente os níveis de defesa para alcançar a segurança necessária, tal como definida pelo risco actualmente aceitável. As tarefas de optimização e de integração desta tese exploram estes conceitos. Além disso, os novos mecanismos propostos foram avaliados em casos de utilização no mundo real, tais como redes 5G ou outras infraestruturas de Network Slicing.Programa Doutoral em Engenharia Informátic

    Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles.

    Full text link
    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction

    Abstracts on Radio Direction Finding (1899 - 1995)

    Get PDF
    The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography). Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM. The contents of these files are: 1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format]; 2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format]; 3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion

    ¿Dónde está el pirata? : el comercio informal de películas digitales en el Perú

    Get PDF
    En el Perú, al igual que en la mayoría de países del mundo, el comercio informal de películas digitales está tipificado como delito. Sin embargo, la inmensa mayoría de consumidores peruanos de películas compra copias DVD piratas, y por lo tanto actúan al margen de la ley. Las normas vigentes sobre propiedad intelectual que ilegitiman este comercio de películas han terminado cuestionando los usos, costumbres y valores de los peruanos. El derecho de acceso libre a la información y cultura que hoy se plantea la sociedad global colisiona con los intereses económicos de las corporaciones productoras de audiovisuales (fundamentalmente con Hollywood) y con una legislación sobre propiedad intelectual que estas corporaciones han promovido a lo largo de las últimas décadas. El objetivo de este trabajo es presentar y analizar algunos temas que nos ayuden a entender el origen, sentido, causas y consecuencias de la problemática cultural y social generada a propósito de la envergadura alcanzada por el comercio informal de películas digitales en el Perú. Para ello, revelaré la manera en que la revolución tecnológica digital ha precipitado la problemática del comercio informal de películas, también mostraré cómo se ha transformado la cadena productiva, de distribución y de consumo de los productos audiovisuales como consecuencia de la revolución tecnológica y la demanda creciente de la población de acceder a la información y la cultura. Como complemento a este aspecto del problema analizaré la historia global y local de la legislación sobre propiedad intelectual para conocer cómo ésta se ha ido modificando a lo largo de los años en beneficio de intereses específicos

    ¿Dónde está el pirata? : el comercio informal de películas digitales en el Perú

    Get PDF
    En el Perú, al igual que en la mayoría de países del mundo, el comercio informal de películas digitales está tipificado como delito. Sin embargo, la inmensa mayoría de consumidores peruanos de películas compra copias DVD piratas, y por lo tanto actúan al margen de la ley. Las normas vigentes sobre propiedad intelectual que ilegitiman este comercio de películas han terminado cuestionando los usos, costumbres y valores de los peruanos. El derecho de acceso libre a la información y cultura que hoy se plantea la sociedad global colisiona con los intereses económicos de las corporaciones productoras de audiovisuales (fundamentalmente con Hollywood) y con una legislación sobre propiedad intelectual que estas corporaciones han promovido a lo largo de las últimas décadas. El objetivo de este trabajo es presentar y analizar algunos temas que nos ayuden a entender el origen, sentido, causas y consecuencias de la problemática cultural y social generada a propósito de la envergadura alcanzada por el comercio informal de películas digitales en el Perú. Para ello, revelaré la manera en que la revolución tecnológica digital ha precipitado la problemática del comercio informal de películas, también mostraré cómo se ha transformado la cadena productiva, de distribución y de consumo de los productos audiovisuales como consecuencia de la revolución tecnológica y la demanda creciente de la población de acceder a la información y la cultura. Como complemento a este aspecto del problema analizaré la historia global y local de la legislación sobre propiedad intelectual para conocer cómo ésta se ha ido modificando a lo largo de los años en beneficio de intereses específicos.Tesi

    Fire Monitoring Handbook

    Get PDF
    Fire is a powerful and enduring force that has had, and will continue to have, a profound influence on National Park Service (NPS) lands. Fire management decisions within the National Park Service require information on fire behavior and on the effects of fire on park resources. With good reason, the public is holding park management increasingly accountable, especially in the area of fire management. Federal and state agencies are instituting progressively more stringent guidelines for burning, monitoring, and evaluation. The impetus behind these guidelines and the purpose of this handbook are to ensure that management objectives are being met, to provide guidance that can prevent fire management problems from developing, to limit possible legal actions against the agency, and to ensure that all parks collect at least the minimum information deemed necessary to evaluate their fire management programs
    corecore