84 research outputs found

    Cross-Layer Treatment of Mobility for Mobile Ad Hoc Networks

    Get PDF
    The current era of mobile communication is passing through the days of rapidly changing technologies. Such an evolving promising technology is mobile ad hoc networks (MANETs). The communications in ad hoc networks are adversely affected by the link failures in the network layer, and by the hidden station, mobile hidden station, neighborhood capture and asymmetric radio link problems in the MAC layer. All the problems are highly affected by mobility of the stations. If the degree of mobility of any station in a route increases, the route life time decreases. That causes frequent link failures, and results packet retransmissions, additional latency and packet loss. An algorithm to include mobility in a routing protocol to reduce packet losses in a MANET is proposed in this thesis. The proposed algorithm estimates the number of packets that can traverse through the route before it breaks because of mobility. The algorithm is implemented in dynamic source routing protocol, and simulated in Network Simulator-2. The MHS problem arises if a station is hidden due to mobility. Asymmetric/unequal radio links in can occur in MANETs/VANETs for many reasons such as hardware limitations, power saving protocols, shadowing effects, dynamic spectrum managements. A MAC protocol named extended reservation Aloha (ERA) is proposed which partially solves these problems. Then, using the concept of ERA, another MAC protocol named extended sliding frame reservation Aloha (ESFRA), which addresses all the above mentioned MAC problems, is proposed in this thesis. As safety critical information dissemination in DSRC/WAVE systems requires reliability and robustness, a network-MAC cross-layer information dissemination protocol is proposed in this thesis to address those issues. Although the layered architecture is still a good candidate for any design of wireless networks, the researchers are looking for some optimizations by interaction between neighbor layers which is called cross-layer design. So I proposed a network-MAC cross-layer algorithm, cross-layer extended sliding frame reservation Aloha (CESFRA), which solves mobility related problems, confirms low and deterministic end-to-end delay, and is robust and reliable in safety critical information dissemination up to 3rd hop. Discrete time Markov chain (DTMC) and OMNeT++ are used for all the MAC layer analyses

    Intrusion detection and response model for mobile ad hoc networks.

    Get PDF
    This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system parameters of a MANET that are affected by various types of attacks, and continuously monitoring the values of these parameters to detect and respond to attacks. This dissertation explains the design and development of the detection framework and the response framework of the IDRMAN. The main aspects of the detection framework are data mining using CART to identify attack sensitive network parameters from the wealth of raw network data, statistical processing using six sigma to identify the thresholds for the attack sensitive parameters and quantification of the MANET node state through a measure called the Threat Index (TI) using fuzzy logic methodology. The main aspects of the response framework are intruder identification and intruder isolation through response action plans. The effectiveness of the detection and response framework is mathematically analyzed using probability techniques. The detection framework is also evaluated by performance comparison experiments with related models, and through performance evaluation experiments from scalability perspective. Performance metrics used for assessing the detection aspect of the proposed model are detection rate and false positive rate at different node mobility speed. Performance evaluation experiments for scalability are with respect to the size of the MANET, where more and more mobile nodes are added into the MANET at varied mobility speed. The results of both the mathematical analysis and the performance evaluation experiments demonstrate that the IDRMAN model is an effective and viable security model for MANET

    Trespassory Art

    Get PDF
    The history of art is replete with examples of artists who have broken from existing conventions and genres, redefining the meaning of art and its function in society. Our interest is in emerging forms of art that trespass-occupy space, place, and time as part of their aesthetic identity. These new forms of art, which we call trespassory art, are creatures of a movement that seeks to appropriate cultural norms and cultural signals, reinterpreting them to create new meaning. Marcel DuChamp produced such a result when, in the early twentieth century, he took a urinal, signed it, titled it Fountain, and called it art. Whether they employ twenty-first-century technologies, such as lasers, or painting, sculpture and mosaic, music, theatre, or merely the human body, these new artists share one thing in common. Integral to their art is the physical invasion of space, the trespass, often challenging our conventional ideas of location, time, ownership, and artistic expression. Their art requires not only borrowing the intellectual assets of others, but their physical assets. This is trespassory art-art that redefines and reinterprets space-art that gives new meaning to a park bench, to a billboard, to a wall, to space itself. Our purpose is to propose a modified regime in the law of trespass to make room for the many new forms of art with which we are concerned-art that is locationally dependent or site specific. We begin by briefly describing and characterizing these often-new artistic forms. This provides a jumping off point for addressing the basic question this Article seeks to address-should the law accommodate these new types of art, and if so, to what degree? We first turn to the law of trespass, with particular focus on real property, both public and private, but also with an eye to personal and intellectual property. We conclude that adjusting trespass remedies for artistic trespass through a set of common law privileges would better balance the competing interests of owners and artists than do current trespass rules. We then turn to a set of constitutional issues and conclude that our common law proposal is consistent with, and in some ways perhaps required by, the First Amendment. Finally, we summarize our proposal and then revisit the value of trespassory art as art in our creative culture

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Investigation of mobile devices usage and mobile augmented reality applications among older people

    Get PDF
    Mobile devices such as tablets and smartphones have allow users to communicate, entertainment, access information and perform productivity. However, older people are having issues to utilise mobile devices that may affect their quality of life and wellbeing. There are some potentials of mobile Augmented Reality (AR) applications to increase older users mobile usage by enhancing their experience and learning. The study aims to investigate mobile devices potential barriers and influence factors in using mobile devices. It also seeks to understand older people issues in using AR applications

    Vol. 70, no. 2: Full Issue

    Get PDF

    Creation of value with open source software in the telecommunications field

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    Black and White and Read in Profile: The Silhouette as Race Manirhetoric in Flannery O\u27Connor and Kara Walker

    Get PDF
    ABSTRACT My research project, in fulfillment of the requirements for the dissertation in Rhetorics, Communication, and Information Design, utilizes the schema or trope of the silhouette as a binding metaphor for black/white race relationships in America. Specifically, I argue that there is no better model for examining social interactions between the races than the back- and fore-grounding that is transacted through this primarily visual--but also verbal and oral--technique of profiling and outlining. This is particularly true given its origins in discriminatory practice, dating as far back as the literary iconismos and characterismos used to categorize Greek and Roman slaves, and the ethnic taxonomies perpetuated with Johann Kaspar Lavater\u27s Essays on Physiognomy. In locating the silhouette as a major trope in the discourses on race, I am adding to the rhetorical lexicon by coining the term manirhetorical, and applying it to illustrate the unique and adaptive features of the silhouette--its suitability to operate through various media and to accommodate multiple tasks. Thus, I examine the manirhetorical practices of two artists, one primarily literary--Flannery O\u27Connor--whose principled positioning in the Southern gothic tradition of grotesque literature comports accurately with the sense of privilege and entitlement that is examined in a focused way in the field of Whiteness Studies. The other artist considered in this study--Kara Walker--is primarily a visual rhetorical virtuoso, whose works with the silhouette are used to both develop and demonstrate her racial and feminist ethos. Both artists perform the recuperation and re/appropriation of the silhouette as manirhetorical trope of critique in the \u27signifyin\u27\u27 tradition described by Henry Louis Gates, Jr. Both artists make multiple uses of the silhouette as verbal and visual representations for race relations, and for their accordant power dynamics--and in the process perform racial profiling. My study has application for writing and other across-the-curriculum programs, as well as for theme-based and engaged learning models. This work involves multimedia as well as inter- and transdisciplinary content and methodologies

    Security of Cyber-Physical Systems

    Get PDF
    Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems
    corecore