278 research outputs found
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Mobile Ad hoc NETwork (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastructure. This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. Checkpointing is a well explored fault tolerance technique for the wired and cellular mobile networks. However, it is not directly applicable to MANET due to its dynamic topology, limited availability of stable storage, partitioning and the absence of fixed infrastructure. In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster based MANET, where only minimum number of mobile hosts in the cluster should take checkpoints. The performance analysis and simulation results show that the proposed scheme performs well compared to works related
A Framework for Dynamic Traffic Monitoring Using Vehicular Ad-Hoc Networks
Traffic management centers (TMCs) need high-quality data regarding the status of roadways for monitoring and delivering up-to-date traffic conditions to the traveling public. Currently this data is measured at static points on the roadway using technologies that have significant maintenance requirements. To obtain an accurate picture of traffic on any road section at any time requires a real-time probe of vehicles traveling in that section. We envision a near-term future where network communication devices are commonly included in new vehicles. These devices will allow vehicles to form vehicular networks allowing communication among themselves, other vehicles, and roadside units (RSUs) to improve driver safety, provide enhanced monitoring to TMCs, and deliver real-time traffic conditions to drivers.
In this dissertation, we contribute and develop a framework for dynamic trafficmonitoring (DTMon) using vehicular networks. We introduce RSUs called task organizers (TOs) that can communicate with equipped vehicles and with a TMC. These TOs can be programmed by the TMC to task vehicles with performing traffic measurements over various sections of the roadway. Measurement points for TOs, or virtual strips, can be changed dynamically, placed anywhere within several kilometers of the TO, and used to measure wide areas of the roadway network. This is a vast improvement over current technology.
We analyze the ability of a TO, or multiple TOs, to monitor high-quality traffic datain various traffic conditions (e.g., free flow traffic, transient flow traffic, traffic with congestion, etc.). We show that DTMon can accurately monitor speed and travel times in both free-flow and traffic with transient congestion. For some types of data, the percentage of equipped vehicles, or the market penetration rate, affects the quality of data gathered. Thus, we investigate methods for mitigating the effects of low penetration rate as well as low traffic density on data quality using DTMon. This includes studying the deployment of multiple TOs in a region and the use of oncoming traffic to help bridge gaps in connectivity.
We show that DTMon can have a large impact on traffic monitoring. Traffic engineers can take advantage of the programmability of TOs, giving them the ability to measure traffic at any point within several km of a TO. Most real-time traffic maps measure traffic at midpoint of roads between interchanges and the use of this framework would allow for virtual strips to be placed at various locations in between interchanges, providing fine-grained measurements to TMCs. In addition, the measurement points can be adjusted as traffic conditions change. An important application of this is end-of-queue management. Traffic engineers are very interested in deliver timely information to drivers approaching congestion endpoints to improve safety. We show the ability of DTMon in detecting the end of the queue during congestion
Experimenting with commodity 802.11 hardware: overview and future directions
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-driven research works. These works range from performance analysis to protocol enhancements, including the proposal of novel applications and services. Due to the affordability of the technology, this experimental research is typically based on commercial off-the-shelf (COTS) devices, and, given the rate at which 802.11 releases new standards (which are adopted into new, affordable devices), the field is likely to continue to produce results. In this paper, we review and categorise the most prevalent works carried out with 802.11 COTS devices over the past 15 years, to present a timely snapshot of the areas that have attracted the most attention so far, through a taxonomy that distinguishes between performance studies, enhancements, services, and methodology. In this way, we provide a quick overview of the results achieved by the research community that enables prospective authors to identify potential areas of new research, some of which are discussed after the presentation of the survey.This work has been partly supported by the European Community through the CROWD project (FP7-ICT-318115) and by the Madrid Regional Government through the TIGRE5-CM program (S2013/ICE-2919).Publicad
Clustering algorithms to further enhance predictable situational data in vehicular ad-hoc networks
The modern world is constantly in a state of technological revolution. Everyday some new technological idea, invention, or threat emerges. With modern computer software and hardware advancements, we have the emergence of more internet-enabled devices - or, Internet of Things (IoT) devices. We can now create large networks with any device to gather real-time information about an environment. In conjunction, modern car companies across the board have a push from public demand for a fully-autonomous car. In order to accomplish autonomy safely and effectively, Vehicular Ad-Hoc Networks (VANETs) must be established for a local group of cars and their environment to ensure all correct and relevant information is communicated throughout the network. The data collected in a VANET can be passed to machine learning models in order to predict possible conditions and detect anomalies. This thesis explores different ways of clustering local groups of vehicles along with machine learning algorithms to predict where vehicles are likely to be and detect false or impossible information
HyTasker:Hybrid Task Allocation in Mobile Crowd Sensing
Task allocation is a major challenge in Mobile Crowd Sensing (MCS). While previous task allocation approaches follow either the opportunistic or participatory mode, this paper proposes to integrate these two complementary modes in a two-phased hybrid framework called HyTasker. In the offline phase, a group of workers (called opportunistic workers ) are selected, and they complete MCS tasks during their daily routines (i.e., opportunistic mode). In the online phase, we assign another set of workers (called participatory workers ) and require them to move specifically to perform tasks that are not completed by the opportunistic workers (i.e., participatory mode). Instead of considering these two phases separately, HyTasker jointly optimizes them with a total incentive budget constraint. In particular, when selecting opportunistic workers in the offline phase of HyTasker, we propose a novel algorithm that simultaneously considers the predicted task assignment for the participatory workers, in which the density and mobility of participatory workers are taken into account. Experiments on two real-world mobility datasets demonstrate that HyTasker outperforms other methods with more completed tasks under the same budget constraint
Hardware Assisted Solutions for Automobile Security
In the past couple of decades, many in-vehicle features have been invented and deployed in order to make modern vehicles which not only safer and more reliable but also connected, smarter, and intelligent. Meanwhile, vehicular ad-hoc networks (VANETs) are proposed to provide communications between vehicles and road-side stations as the foundation of the intelligent transportation system to provide efficient and safe transportation. To support these updated functions, a large amount of electronic equipment has been integrated into the car system. Although these add-on functions around vehicles offer great help in driving assistance, they inevitably introduced new security vulnerabilities that threaten the safety of the on-board drivers, passengers and pedestrians. This has been demonstrated by many well-documented attacks either on the in-vehicle bus system or on the wireless vehicular network communications. In this dissertation, we design and implement several hardware-oriented solutions to the arousing security issues on vehicles. More specifically, we focus on three important and representative problems: (1) how to secure the in-vehicle Controller Area Network (CAN), (2) how to secure the communication between vehicle and outside, and (3) how to establish trust on VANETs.
Current approaches based on cryptographic algorithms to secure CAN bus violate the strict timing and limited resource constraints for CAN communications. We thus emphasize on the alternate solution of intrusion detection system (IDS) in this dissertation. We explore monitoring the changes of CAN message content or the physical delay of its transmission to detect on the CAN bus. We first propose a new entropy-based IDS following the observation that all the known CAN message injection attacks need to alter the CAN identifier bit. Thus, analyzing the entropy changes of such bits can be an effective way to detect those attacks. Next, we develop a delay-based IDS to protect the CAN network by identifying the location of the compromised Electronic Control Unit (ECU) from the transmission delay difference to two terminals connected to the CAN bus. We demonstrate that both approaches can protect the integrity of the messages on CAN bus leading to a further improve the security and safety of autonomous vehicles.
In the second part of this dissertation, we consider Plug-and-Secure, an industrial practice on key management for automotive CAN networks. It has been proven to be information theoretically secure. However, we discover side-channel attacks based on the physical properties of the CAN bus that can leak almost the entire secret key bits. We analyze the fundamental characteristics that lead to such attacks and propose techniques to minimize information leakage at the hardware level.
Next, we extend our study from in-vehicle secure CAN communication to the communication between vehicle and outside world. We take the example of the popular GPS spoofing attack and show how we can use the rich information from CAN bus to build a cross-validation system to detect such attacks. Our approach is based on the belief that the local driving data from the in-vehicle network can be authenticated and thus trusted by secure CAN networks mechanisms. Such data can be used to cross-validate the GPS signals from the satellite which are vulnerable to spoofing attacks. We conduct driving tests on real roads to show that our proposed approach can defend both GPS spoofing attacks and location-based attacks on the VANETs.
Finally, we propose a blockchain based Anonymous Reputation System (BARS) to establish a privacy-preserving trust model for VANETs. The certificate and revocation transparency is implemented efficiently with the proofs of presence and absence based on the extended blockchain technology. To prevent the broadcast of forged messages, a reputation evaluation algorithm is presented relying on both direct historical interactions of that vehicle and indirect opinions from the other vehicles.
This dissertation features solutions to vehicle security problems based on hardware or physical characteristics, instead of cryptographic algorithms. We believe that given the critical timing requirement on vehicular systems and their very limited resource (such as the bandwidth on CAN bus), this will be a very promising direction to secure vehicles and vehicular network
MANAGING THE EFFECTS OF WIRELESS SENSORS ON VEHICLE AD HOC NETWORK (VANET) SAFETY
This paper proposes to conduct research on the vehicular ad hoc networks (VANET) area of
Intelligent Transportation Systems (ITS) with a focus on investigating safety methods that will
significantly reduce passenger vehicle collisions which ultimately will help to save lives and
reduce property losses. Key areas of this ITS research will include highway infrastructure or
wireless sensor networks (WSN) to the cloud (web service) and the cloud (web service) to
highway infrastructure or wireless sensor network (WSN). In turn, the cloud (web service) will
communicate with passenger vehicles as components of a highway infrastructure (WSN) to
vehicle (I2V) systems and a vehicle to highway infrastructure (V2I) systems.
In turn, the cloud (web service) will communicate with passenger vehicles as components of a
vehicle to highway infrastructure (V2I) system and a highway infrastructure to vehicle (I2V)
system. Active circuit emulation will be used as an analysis tool for this research. The cloud web
service in this case, will be a database that will be connected through an IEEE802.11 broadband
(Wi-Fi) gateway via a border router or a network capable application processor (NCAP) to
hardware and software wireless sensor networks or a simulated wireless network. The
highway infrastructure portion of this design will be the IEEE1451 standard-based wireless
sensor network called wireless transducer interface modules (WTIM). These WTIMs will be
responsible for disseminating information from their multitude of sensors to vehicles and/or to
the cloud via NCAP routers
Performance analysis of 4G wireless networks using system level simulator
Doutoramento em Engenharia ElectrotécnicaIn the last decade, mobile wireless communications have witnessed an explosive
growth in the user’s penetration rate and their widespread deployment around the
globe. In particular, a research topic of particular relevance in telecommunications
nowadays is related to the design and implementation of mobile communication
systems of 4th generation (4G). 4G networks will be characterized by the support
of multiple radio access technologies in a core network fully compliant with the
Internet Protocol (all IP paradigms). Such networks will sustain the stringent
quality of service (QoS) requirements and the expected high data rates from the
type of multimedia applications (i.e. YouTube and Skype) to be available in the
near future. Therefore, 4G wireless communications system will be of paramount
importance on the development of the information society in the near future.
As 4G wireless services will continue to increase, this will put more and more
pressure on the spectrum availability. There is a worldwide recognition that
methods of spectrum managements have reached their limit and are no longer
optimal, therefore new paradigms must be sought. Studies show that most of the
assigned spectrum is under-utilized, thus the problem in most cases is inefficient
spectrum management rather spectrum shortage. There are currently trends
towards a more liberalized approach of spectrum management, which are tightly
linked to what is commonly termed as Cognitive Radio (CR).
Furthermore, conventional deployment of 4G wireless systems (one BS in cell and
mobile deploy around it) are known to have problems in providing fairness (users
closer to the BS are more benefited relatively to the cell edge users) and in
covering some zones affected by shadowing, therefore the use of relays has been
proposed as a solution.
To evaluate and analyse the performances of 4G wireless systems software tools
are normally used. Software tools have become more and more mature in recent
years and their need to provide a high level evaluation of proposed algorithms and
protocols is now more important. The system level simulation (SLS) tools provide
a fundamental and flexible way to test all the envisioned algorithms and protocols
under realistic conditions, without the need to deal with the problems of live
networks or reduced scope prototypes. Furthermore, the tools allow network
designers a rapid collection of a wide range of performance metrics that are useful
for the analysis and optimization of different algorithms.
This dissertation proposes the design and implementation of conventional system
level simulator (SLS), which afterwards enhances for the 4G wireless technologies
namely cognitive Radios (IEEE802.22) and Relays (IEEE802.16j). SLS is then
used for the analysis of proposed algorithms and protocols.FC
Interference charecterisation, location and bandwidth estimation in emerging WiFi networks
Wireless LAN technology based on the IEEE 802.11 standard, commonly referred
to as WiFi, has been hugely successful not only for the last hop access to the Internet
in home, office and hotspot scenarios but also for realising wireless backhaul in mesh
networks and for point -to -point long- distance wireless communication. This success
can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching
economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices,
has led to significant amount of research effort looking at the performance issues
arising from various factors, including interference, CSMA/CA based MAC protocol
used by 802.11 devices, the impact of link and physical layer overheads on application
performance, and spatio-temporal channel variations. These factors affect the performance
of applications and services that run over WiFi networks. In this thesis, we
experimentally investigate the effects of some of the above mentioned factors in the
context of emerging WiFi network scenarios such as multi- interface indoor mesh networks,
802.11n -based WiFi networks and WiFi networks with virtual access points
(VAPs). More specifically, this thesis comprises of four experimental characterisation
studies: (i) measure prevalence and severity of co- channel interference in urban WiFi
deployments; (ii) characterise interference in multi- interface indoor mesh networks;
(iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation
on WiFi fingerprinting based location estimation; and (iv) study the effects of
newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth
estimation.With growing density of WiFi deployments especially in urban areas, co- channel
interference becomes a major factor that adversely affects network performance. To
characterise the nature of this phenomena at a city scale, we propose using a new measurement
methodology called mobile crowdsensing. The idea is to leverage commodity
smartphones and the natural mobility of people to characterise urban WiFi co- channel
interference. Specifically, we report measurement results obtained for Edinburgh, a
representative European city, on detecting the presence of deployed WiFi APs via the
mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily
used and there is hardly any activity in the 5GHz band even though relatively it
has a greater number of available channels. Spatial analysis of spectrum usage reveals
that co- channel interference among nearby APs operating in the same channel
can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar
to those of WiFi deployments in public spaces of different indoor environments. We
validate our approach in comparison with wardriving, and also show that our findings
generally match with previous studies based on other measurement approaches. As
an application of the mobile crowdsensing based urban WiFi monitoring, we outline a
cloud based WiFi router configuration service for better interference management with
global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical
way to achieve high end -to -end network performance and better utilisation of
available spectrum. However this gives rise to another type of interference (referred to
as coexistence interference) due to co- location of multiple radio interfaces. We show
that such interference can be so severe that it prevents concurrent successful operation
of collocated interfaces even when they use channels from widely different frequency
bands. We propose the use of antenna polarisation to mitigate such interference and
experimentally study its benefits in both multi -band and single -band configurations. In
particular, we show that using differently polarised antennas on a multi -radio platform
can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent
channel interference phenomena that underlie multi -radio coexistence interference.
We also validate observations about adjacent channel interference from previous
studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications.
The rapidly growing adoption of smartphones has resulted in a plethora of mobile
applications that rely on position information (e.g., shopping apps that use user position
information to recommend products to users and help them to find what they want
in the store). WiFi fingerprinting is a popular and well studied approach for indoor
location estimation that leverages the existing WiFi infrastructure and works based on
the difference in strengths of the received AP signals at different locations. However,
understanding the impact of WiFi network deployment aspects such as multi -band
APs and VAPs has not received much attention in the literature. We first examine the
impact of various aspects underlying a WiFi fingerprinting system. Specifically, we
investigate different definitions for fingerprinting and location estimation algorithms
across different indoor environments ranging from a multi- storey office building to
shopping centres of different sizes. Our results show that the fingerprint definition
is as important as the choice of location estimation algorithm and there is no single
combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz
and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with
WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the
5GHz band yields more accurate location estimation. We show that the inclusion of
VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems;
we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from
adaptive application content delivery, transport-level transmission rate adaptation and
admission control to traffic engineering and peer node selection in peer -to- peer /overlay
networks [ 1, 2]. Given its importance, it has been received much research attention in
both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards),
resulting in different ABE techniques and tools proposed to optimise different criteria
and suit different scenarios. However, effects of new MAC/PHY layer enhancements
in new and next generation WiFi networks (based on 802.11n and 802.11ac
standards) have not been studied yet. We experimentally find that among different
new features like frame aggregation, channel bonding and MIMO modes (spacial division
multiplexing), frame aggregation has the most harmful effect as it has direct
effect on ABE by distorting the measurement probing traffic pattern commonly used
to estimate available bandwidth. Frame aggregation is also specified in both 802.11n
and 802.1 lac standards as a mandatory feature to be supported. We study the effect of
enabling frame aggregation, for the first time, on the performance of the ABE using an
indoor 802.11n wireless testbed. The analysis of results obtained using three tools -
representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based
approaches for ABE - led us to come up with the two key principles of jumbo probes
and having longer measurement probe train sizes to counter the effects of aggregating
frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that
is aware of the underlying frame aggregation by incorporating these principles. The
experimental evaluation of WBest+ shows more accurate ABE in the presence of frame
aggregation.Overall, the contributions of this thesis fall in three categories - experimental
characterisation, measurement techniques and mitigation/solution approaches for performance
problems in emerging WiFi network scenarios. The influence of various factors
mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation
of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are
carried out in real environments. New measurement approaches are also introduced
to aid better experimental evaluation or proposed as new measurement tools. These
include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of
co- existence interference; and WBest+ tool for available bandwidth estimation. Finally,
new mitigation approaches are proposed to address challenges and problems
identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting
antenna polarisation diversity to remedy the effects of co- existence interference
in multi -interface platforms; taking advantage of VAPs and multi -band operation for
better location estimation; and introducing the jumbo frame concept and longer probe
train sizes to improve performance of ABE tools in next generation WiFi networks
- …