26,000 research outputs found
Characterization of Vehicle Behavior with Information Theory
This work proposes the use of Information Theory for the characterization of
vehicles behavior through their velocities. Three public data sets were used:
i.Mobile Century data set collected on Highway I-880, near Union City,
California; ii.Borl\"ange GPS data set collected in the Swedish city of
Borl\"ange; and iii.Beijing taxicabs data set collected in Beijing, China,
where each vehicle speed is stored as a time series. The Bandt-Pompe
methodology combined with the Complexity-Entropy plane were used to identify
different regimes and behaviors. The global velocity is compatible with a
correlated noise with f^{-k} Power Spectrum with k >= 0. With this we identify
traffic behaviors as, for instance, random velocities (k aprox. 0) when there
is congestion, and more correlated velocities (k aprox. 3) in the presence of
free traffic flow
TCP over CDMA2000 Networks: A Cross-Layer Measurement Study
Modern cellular channels in 3G networks incorporate sophisticated power control and dynamic rate adaptation which can have significant impact on adaptive transport layer protocols, such as TCP. Though there exists studies that have evaluated the performance of TCP over such networks, they are based solely on observations at the transport layer and hence have no visibility into the impact of lower layer dynamics, which are a key characteristic of these networks. In this work, we present a detailed characterization of TCP behavior based on cross-layer measurement of transport layer, as well as RF and MAC layer parameters. In particular, through a series of active TCP/UDP experiments and measurement of the relevant variables at all three layers, we characterize both, the wireless scheduler and the radio link protocol in a commercial CDMA2000 network and assess their impact on TCP dynamics. Somewhat surprisingly, our findings indicate that the wireless scheduler is mostly insensitive to channel quality and sector load over short timescales and is mainly affected by the transport layer data rate. Furthermore, with the help of a robust correlation measure, Normalized Mutual Information, we were able to quantify the impact of the wireless scheduler and the radio link protocol on various TCP parameters such as the round trip time, throughput and packet loss rate
A Measurement Based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations
The vehicle-to-vehicle (V2V) propagation channel has significant implications
on the design and performance of novel communication protocols for vehicular ad
hoc networks (VANETs). Extensive research efforts have been made to develop V2V
channel models to be implemented in advanced VANET system simulators for
performance evaluation. The impact of shadowing caused by other vehicles has,
however, largely been neglected in most of the models, as well as in the system
simulations. In this paper we present a shadow fading model targeting system
simulations based on real measurements performed in urban and highway
scenarios. The measurement data is separated into three categories,
line-of-sight (LOS), obstructed line-of-sight (OLOS) by vehicles, and non
line-of-sight due to buildings, with the help of video information recorded
during the measurements. It is observed that vehicles obstructing the LOS
induce an additional average attenuation of about 10 dB in the received signal
power. An approach to incorporate the LOS/OLOS model into existing VANET
simulators is also provided. Finally, system level VANET simulation results are
presented, showing the difference between the LOS/OLOS model and a channel
model based on Nakagami-m fading.Comment: 10 pages, 12 figures, submitted to Hindawi International Journal of
Antennas and Propagatio
Spatiotemporal patterns and predictability of cyberattacks
A relatively unexplored issue in cybersecurity science and engineering is
whether there exist intrinsic patterns of cyberattacks. Conventional wisdom
favors absence of such patterns due to the overwhelming complexity of the
modern cyberspace. Surprisingly, through a detailed analysis of an extensive
data set that records the time-dependent frequencies of attacks over a
relatively wide range of consecutive IP addresses, we successfully uncover
intrinsic spatiotemporal patterns underlying cyberattacks, where the term
"spatio" refers to the IP address space. In particular, we focus on analyzing
{\em macroscopic} properties of the attack traffic flows and identify two main
patterns with distinct spatiotemporal characteristics: deterministic and
stochastic. Strikingly, there are very few sets of major attackers committing
almost all the attacks, since their attack "fingerprints" and target selection
scheme can be unequivocally identified according to the very limited number of
unique spatiotemporal characteristics, each of which only exists on a
consecutive IP region and differs significantly from the others. We utilize a
number of quantitative measures, including the flux-fluctuation law, the Markov
state transition probability matrix, and predictability measures, to
characterize the attack patterns in a comprehensive manner. A general finding
is that the attack patterns possess high degrees of predictability, potentially
paving the way to anticipating and, consequently, mitigating or even preventing
large-scale cyberattacks using macroscopic approaches
On the Interaction between TCP and the Wireless Channel in CDMA2000 Networks
In this work, we conducted extensive active measurements on a large nationwide CDMA2000 1xRTT network in order to characterize the impact of both the Radio Link Protocol and more importantly, the wireless scheduler, on TCP. Our measurements include standard TCP/UDP logs, as well as detailed RF layer statistics that allow observability into RF dynamics. With the help of a robust correlation measure, normalized mutual information, we were able to quantify the impact of these two RF factors on TCP performance metrics such as the round trip time, packet loss rate, instantaneous throughput etc. We show that the variable channel rate has the larger impact on TCP behavior when compared to the Radio Link Protocol. Furthermore, we expose and rank the factors that influence the assigned channel rate itself and in particular, demonstrate the sensitivity of the wireless scheduler to the data sending rate. Thus, TCP is adapting its rate to match the available network capacity, while the rate allocated by the wireless scheduler is influenced by the sender's behavior. Such a system is best described as a closed loop system with two feedback controllers, the TCP controller and the wireless scheduler, each one affecting the other's decisions. In this work, we take the first steps in characterizing such a system in a realistic environment
State-of-the-art in Power Line Communications: from the Applications to the Medium
In recent decades, power line communication has attracted considerable
attention from the research community and industry, as well as from regulatory
and standardization bodies. In this article we provide an overview of both
narrowband and broadband systems, covering potential applications, regulatory
and standardization efforts and recent research advancements in channel
characterization, physical layer performance, medium access and higher layer
specifications and evaluations. We also identify areas of current and further
study that will enable the continued success of power line communication
technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on
Selected Areas in Communications. Special Issue on Power Line Communications
and its Integration with the Networking Ecosystem. 201
Spatiotemporal Patterns and Predictability of Cyberattacks
Y.C.L. was supported by Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-10-1-0083 and Army Research Office (ARO) under grant no. W911NF-14-1-0504. S.X. was supported by Army Research Office (ARO) under grant no. W911NF-13-1-0141. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD
- …