512 research outputs found

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Designing Usable and Secure Authentication Mechanisms for Public Spaces

    Get PDF
    Usable and secure authentication is a research field that approaches different challenges related to authentication, including security, from a human-computer interaction perspective. That is, work in this field tries to overcome security, memorability and performance problems that are related to the interaction with an authentication mechanism. More and more services that require authentication, like ticket vending machines or automated teller machines (ATMs), take place in a public setting, in which security threats are more inherent than in other settings. In this work, we approach the problem of usable and secure authentication for public spaces. The key result of the work reported here is a set of well-founded criteria for the systematic evaluation of authentication mechanisms. These criteria are justified by two different types of investigation, which are on the one hand prototypical examples of authentication mechanisms with improved usability and security, and on the other hand empirical studies of security-related behavior in public spaces. So this work can be structured in three steps: Firstly, we present five authentication mechanisms that were designed to overcome the main weaknesses of related work which we identified using a newly created categorization of authentication mechanisms for public spaces. The systems were evaluated in detail and showed encouraging results for future use. This and the negative sides and problems that we encountered with these systems helped us to gain diverse insights on the design and evaluation process of such systems in general. It showed that the development process of authentication mechanisms for public spaces needs to be improved to create better results. Along with this, it provided insights on why related work is difficult to compare to each other. Keeping this in mind, first criteria were identified that can fill these holes and improve design and evaluation of authentication mechanisms, with a focus on the public setting. Furthermore, a series of work was performed to gain insights on factors influencing the quality of authentication mechanisms and to define a catalog of criteria that can be used to support creating such systems. It includes a long-term study of different PIN-entry systems as well as two field studies and field interviews on real world ATM-use. With this, we could refine the previous criteria and define additional criteria, many of them related to human factors. For instance, we showed that social issues, like trust, can highly affect the security of an authentication mechanism. We used these results to define a catalog of seven criteria. Besides their definition, we provide information on how applying them influences the design, implementation and evaluation of a the development process, and more specifically, how adherence improves authentication in general. A comparison of two authentication mechanisms for public spaces shows that a system that fulfills the criteria outperforms a system with less compliance. We could also show that compliance not only improves the authentication mechanisms themselves, it also allows for detailed comparisons between different systems

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges

    Socio-Informatics

    Get PDF
    Contents Editorial Thematic Focus: Socio-Informatics Introduction to the Thematic Focus “Socio-Informatics” / Claudia Müller Digitalisation in Small German Metal-Working Companies. Appropriation of Technology in a “Traditional” Industrial Domain / Bernhard Nett, Jennifer Bönsch Travelling by Taxi Brousse in Madagascar: An Investigation into Practices of Overland Transportation / Volker Wulf, Kaoru Misaki, Dave Randall, and Markus Rohde Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail / Christian Reuter, Inken Leopold Facebook and the Mass Media in Tunisia / Konstantin Aal, Marén Schorch, Esma Ben Hadj Elkilani, Volker Wulf Book Review Symposium Charles Goodwin Charles Goodwin’s Co-Operative Action: The Idea and the Argument / Erhard Schüttpelz, Christian Meyer Multi-Modal Interaction and Tool-Making: Goodwin’s Intuition / Christian Meyer, Erhard Schüttpelz Co-Operation is a Feature of Sociality, not an Attribute of People : “We inhabit each other’s actions.” (Goodwin, cover) / Jutta Wiesemann, Klaus Amann The Making of the World in Co-Operative Action. From Sentence Construction to Cultural Evolution / Jürgen Streeck On Goodwin and his Co-Operative Action / Jörg R. Bergman

    Load balancing and context aware enhancements for RPL routed Internet of Things.

    Get PDF
    Internet of Things (IoT) has been paving the way for a plethora of potential applications, which becomes more spatial and demanding. The goal of this work is to optimise the performance within the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in the network layer.RPL still suffers from unbalanced load traffic among the candidate parents. Consequently, the overloaded parent node drains its energy much faster than other candidate parent nodes. This may lead to an early disconnection of a part of the network topology and affect the overall network reliability. To solve this problem, a new objective function (OF) has been proposed to usher better load balancing among the bottleneck candidate parents, and keep the overloaded nodes lifetime thriving to longer survival.Moreover, several IoT applications have antagonistic requirements but pertinent, which results in a greater risk of affecting the network reliability, especially within the emergency scenarios. With the presence of this challenging issue, the current standardised RPL OFs cannot sufficiently fulfil the antagonistic needs of Low-power and Lossy Networks (LLNs) applications. In response to the above issues, a context adaptive OF has been proposed to facilitate exchanging the synergy information between the application and network layers. Thus, the impact of the antagonistic requirements based on context parameters will be mitigated via rationalizing the selection decision of the routing path towards the root node.We implemented the proposed protocol and verified all our findings through excessive measurements via simulations and a realistic deployment using a real testbed of a multi-hop LLNs motes. The results proved the superiority of our solution over the existing ones with respect to end-to-end delay, packet delivery ratio and network lifetime. Our contribution has been accepted initially to be adopted within the standard body Internet Engineering Task Force (IETF)

    Recent Developments in Smart Healthcare

    Get PDF
    Medicine is undergoing a sector-wide transformation thanks to the advances in computing and networking technologies. Healthcare is changing from reactive and hospital-centered to preventive and personalized, from disease focused to well-being centered. In essence, the healthcare systems, as well as fundamental medicine research, are becoming smarter. We anticipate significant improvements in areas ranging from molecular genomics and proteomics to decision support for healthcare professionals through big data analytics, to support behavior changes through technology-enabled self-management, and social and motivational support. Furthermore, with smart technologies, healthcare delivery could also be made more efficient, higher quality, and lower cost. In this special issue, we received a total 45 submissions and accepted 19 outstanding papers that roughly span across several interesting topics on smart healthcare, including public health, health information technology (Health IT), and smart medicine

    Pro-collaborative mobile systems in next generation IP networks

    Full text link
    Computing system designs of today take on either the interactive or the proactive form. Motivated by the user’s desire to make his/her computing experience more intelligent and personalised, the progression from interactive (human-centred) to proactive (human-supervised) is evident. It can be observed that current research mainly emphasises the user as the dominant focus of a user-system interaction. Consider a model that we called the opponent-process model. It contains two processes, one representing the user and the other the system, where both processes are capable of dominating each other, though working collaboratively towards a predefined task. We argue the necessity to design computing systems which are balanced in this model, such that the system process, at times, becomes the dominant process. We refer to this as the pro-collaborative design form. We dissect mobility into the notion of a nomadic user and the notion of a nomadic system. The examination into the nomadic user problem space reveals the potential for applying the pro-collaborative approach in optimising handoff management. Significant performance advantages can be obtained with our proposed S-MIP framework, based on the pro-collaborative design, when compared with established handoff latency optimisation schemes. The key differentiator lies in its indicative approach in addressing handoff ambiguity. Instead of passively anticipating through prediction as to when a mobile user might cross network boundaries (user-dominant), the system actively indicates to the user when, where and how to handoff (system-dominant). This eliminates the handoff ambiguity. Regarding the notion of a nomadic system, that is, the ability to move services offered by computing systems to arbitrary points in the Internet, we explore the idea of the dynamic extension of network services to a mobile user on-demand. Based on the pro-collaborative form, we develop the METAMORPHOSE architecture which facilitates such a dynamic service extension. By assuming the proliferation of programmable network switches and computational resources within the Internet, we re-examine how ‘loose’ service agreements between network services providers can be, to achieve such borderless moving-service offerings. The viability of the pro-collaborative form is reflected through our design and implementation of protocols and architectures which address the notion of nomadic user and nomadic system

    The integrity of digital technologies in the evolving characteristics of real-time enterprise architecture

    Get PDF
    Advancements in interactive and responsive enterprises involve real-time access to the information and capabilities of emerging technologies. Digital technologies (DTs) are emerging technologies that provide end-to-end business processes (BPs), engage a diversified set of real-time enterprise (RTE) participants, and institutes interactive DT services. This thesis offers a selection of the author’s work over the last decade that addresses the real-time access to changing characteristics of information and integration of DTs. They are critical for RTEs to run a competitive business and respond to a dynamic marketplace. The primary contributions of this work are listed below. • Performed an intense investigation to illustrate the challenges of the RTE during the advancement of DTs and corresponding business operations. • Constituted a practical approach to continuously evolve the RTEs and measure the impact of DTs by developing, instrumenting, and inferring the standardized RTE architecture and DTs. • Established the RTE operational governance framework and instituted it to provide structure, oversight responsibilities, features, and interdependencies of business operations. • Formulated the incremental risk (IR) modeling framework to identify and correlate the evolving risks of the RTEs during the deployment of DT services. • DT service classifications scheme is derived based on BPs, BP activities, DT’s paradigms, RTE processes, and RTE policies. • Identified and assessed the evaluation paradigms of the RTEs to measure the progress of the RTE architecture based on the DT service classifications. The starting point was the author’s experience with evolving aspects of DTs that are disrupting industries and consequently impacting the sustainability of the RTE. The initial publications emphasized innovative characteristics of DTs and lack of standardization, indicating the impact and adaptation of DTs are questionable for the RTEs. The publications are focused on developing different elements of RTE architecture. Each published work concerns the creation of an RTE architecture framework fit to the purpose of business operations in association with the DT services and associated capabilities. The RTE operational governance framework and incremental risk methodology presented in subsequent publications ensure the continuous evolution of RTE in advancements of DTs. Eventually, each publication presents the evaluation paradigms based on the identified scheme of DT service classification to measure the success of RTE architecture or corresponding elements of the RTE architecture
    • …
    corecore