32 research outputs found

    Network Coding for Cooperation in Wireless Networks

    Get PDF

    Quantitative Verification and Synthesis of Resilient Networks

    Get PDF

    Network reputation-based quality optimization of video delivery in heterogeneous wireless environments

    Get PDF
    The mass-market adoption of high-end mobile devices and increasing amount of video traffic has led the mobile operators to adopt various solutions to help them cope with the explosion of mobile broadband data traffic, while ensuring high Quality of Service (QoS) levels to their services. Deploying small-cell base stations within the existing macro-cellular networks and offloading traffic from the large macro-cells to the small cells is seen as a promising solution to increase capacity and improve network performance at low cost. Parallel use of diverse technologies is also employed. The result is a heterogeneous network environment (HetNets), part of the next generation network deployments. In this context, this thesis makes a step forward towards the “Always Best Experience” paradigm, which considers mobile users seamlessly roaming in the HetNets environment. Supporting ubiquitous connectivity and enabling very good quality of rich mobile services anywhere and anytime is highly challenging, mostly due to the heterogeneity of the selection criteria, such as: application requirements (e.g., voice, video, data, etc.); different device types and with various capabilities (e.g., smartphones, netbooks, laptops, etc.); multiple overlapping networks using diverse technologies (e.g., Wireless Local Area Networks (IEEE 802.11), Cellular Networks Long Term Evolution (LTE), etc.) and different user preferences. In fact, the mobile users are facing a complex decision when they need to dynamically select the best value network to connect to in order to get the “Always Best Experience”. This thesis presents three major contributions to solve the problem described above: 1) The Location-based Network Prediction mechanism in heterogeneous wireless networks (LNP) provides a shortlist of best available networks to the mobile user based on his location, history record and routing plan; 2) Reputation-oriented Access Network Selection mechanism (RANS) selects the best reputation network from the available networks for the mobile user based on the best trade-off between QoS, energy consumptions and monetary cost. The network reputation is defined based on previous user-network interaction, and consequent user experience with the network. 3) Network Reputation-based Quality Optimization of Video Delivery in heterogeneous networks (NRQOVD) makes use of a reputation mechanism to enhance the video content quality via multipath delivery or delivery adaptation

    Improving the Reliability of Optimised Link State Routing Protocol in Smart Grid’s Neighbour Area Network

    Get PDF
    A reliable and resilient communication infrastructure that can cope with variable application traffic types and delay objectives is one of the prerequisites that differentiates a Smart Grid from the conventional electrical grid. However, the legacy communication infrastructure in the existing electrical grid is insufficient, if not incapable of satisfying the diverse communication requirements of the Smart Grid. The IEEE 802.11 ad hoc Wireless Mesh Network (WMN) is re-emerging as one of the communication networks that can significantly extend the reach of Smart Grid to backend devices through the Advanced Metering Infrastructure (AMI). However, the unique characteristics of AMI application traffic in the Smart Grid poses some interesting challenges to conventional communication networks including the ad hoc WMN. Hence, there is a need to modify the conventional ad hoc WMN, to address the uncertainties that may exist in its applicability in a Smart Grid environment. This research carries out an in-depth study of the communication of Smart Grid application traffic types over ad hoc WMN deployed in the Neighbour Area Network (NAN). It begins by conducting a critical review of the application characteristics and traffic requirements of several Smart Grid applications and highlighting some key challenges. Based on the reviews, and assuming that the application traffic types use the internet protocol (IP) as a transport protocol, a number of Smart Grid application traffic profiles were developed. Through experimental and simulation studies, a performance evaluation of an ad hoc WMN using the Optimised Link State Routing (OLSR) routing protocol was carried out. This highlighted some capacity and reliability issues that routing AMI application traffic may face within a conventional ad hoc WMN in a Smart Grid NAN. Given the fact that conventional routing solutions do not consider the traffic requirements when making routing decisions, another key observation is the inability of link metrics in routing protocols to select good quality links across multiple hops to a destination and also provide Quality of Service (QoS) support for target application traffic. As with most routing protocols, OLSR protocol uses a single routing metric acquired at the network layer, which may not be able to accommodate different QoS requirements for application traffic in Smart Grid. To address these problems, a novel multiple link metrics approach to improve the reliability performance of routing in ad hoc WMN when deployed for Smart Grid is presented. It is based on the OLSR protocol and explores the possibility of applying QoS routing for application traffic types in NAN based ad hoc WMN. Though routing in multiple metrics has been identified as a complex problem, Multi-Criteria Decision Making (MCDM) techniques such as the Analytical Hierarchy Process (AHP) and pruning have been used to perform such routing on wired and wireless multimedia applications. The proposed multiple metrics OLSR with AHP is used to offer the best available route, based on a number of considered metric parameters. To accommodate the variable application traffic requirements, a study that allows application traffic to use the most appropriate routing metric is presented. The multiple metrics development is then evaluated in Network Simulator 2.34; the simulation results demonstrate that it outperforms existing routing methods that are based on single metrics in OLSR. It also shows that it can be used to improve the reliability of application traffic types, thereby overcoming some weaknesses of existing single metric routing across multiple hops in NAN. The IEEE 802.11g was used to compare and analyse the performance of OLSR and the IEEE 802.11b was used to implement the multiple metrics framework which demonstrate a better performance than the single metric. However, the multiple metrics can also be applied for routing on different IEEE wireless standards, as well as other communication technologies such as Power Line Communication (PLC) when deployed in Smart Grid NAN

    “And all the pieces matter...” Hybrid Testing Methods for Android App's Privacy Analysis

    Get PDF
    Smartphones have become inherent to the every day life of billions of people worldwide, and they are used to perform activities such as gaming, interacting with our peers or working. While extremely useful, smartphone apps also have drawbacks, as they can affect the security and privacy of users. Android devices hold a lot of personal data from users, including their social circles (e.g., contacts), usage patterns (e.g., app usage and visited websites) and their physical location. Like in most software products, Android apps often include third-party code (Software Development Kits or SDKs) to include functionality in the app without the need to develop it in-house. Android apps and third-party components embedded in them are often interested in accessing such data, as the online ecosystem is dominated by data-driven business models and revenue streams like advertising. The research community has developed many methods and techniques for analyzing the privacy and security risks of mobile apps, mostly relying on two techniques: static code analysis and dynamic runtime analysis. Static analysis analyzes the code and other resources of an app to detect potential app behaviors. While this makes static analysis easier to scale, it has other drawbacks such as missing app behaviors when developers obfuscate the app’s code to avoid scrutiny. Furthermore, since static analysis only shows potential app behavior, this needs to be confirmed as it can also report false positives due to dead or legacy code. Dynamic analysis analyzes the apps at runtime to provide actual evidence of their behavior. However, these techniques are harder to scale as they need to be run on an instrumented device to collect runtime data. Similarly, there is a need to stimulate the app, simulating real inputs to examine as many code-paths as possible. While there are some automatic techniques to generate synthetic inputs, they have been shown to be insufficient. In this thesis, we explore the benefits of combining static and dynamic analysis techniques to complement each other and reduce their limitations. While most previous work has often relied on using these techniques in isolation, we combine their strengths in different and novel ways that allow us to further study different privacy issues on the Android ecosystem. Namely, we demonstrate the potential of combining these complementary methods to study three inter-related issues: • A regulatory analysis of parental control apps. We use a novel methodology that relies on easy-to-scale static analysis techniques to pin-point potential privacy issues and violations of current legislation by Android apps and their embedded SDKs. We rely on the results from our static analysis to inform the way in which we manually exercise the apps, maximizing our ability to obtain real evidence of these misbehaviors. We study 46 publicly available apps and find instances of data collection and sharing without consent and insecure network transmissions containing personal data. We also see that these apps fail to properly disclose these practices in their privacy policy. • A security analysis of the unauthorized access to permission-protected data without user consent. We use a novel technique that combines the strengths of static and dynamic analysis, by first comparing the data sent by applications at runtime with the permissions granted to each app in order to find instances of potential unauthorized access to permission protected data. Once we have discovered the apps that are accessing personal data without permission, we statically analyze their code in order to discover covert- and side-channels used by apps and SDKs to circumvent the permission system. This methodology allows us to discover apps using the MAC address as a surrogate for location data, two SDKs using the external storage as a covert-channel to share unique identifiers and an app using picture metadata to gain unauthorized access to location data. • A novel SDK detection methodology that relies on obtaining signals observed both in the app’s code and static resources and during its runtime behavior. Then, we rely on a tree structure together with a confidence based system to accurately detect SDK presence without the need of any a priory knowledge and with the ability to discern whether a given SDK is part of legacy or dead code. We prove that this novel methodology can discover third-party SDKs with more accuracy than state-of-the-art tools both on a set of purpose-built ground-truth apps and on a dataset of 5k publicly available apps. With these three case studies, we are able to highlight the benefits of combining static and dynamic analysis techniques for the study of the privacy and security guarantees and risks of Android apps and third-party SDKs. The use of these techniques in isolation would not have allowed us to deeply investigate these privacy issues, as we would lack the ability to provide real evidence of potential breaches of legislation, to pin-point the specific way in which apps are leveraging cover and side channels to break Android’s permission system or we would be unable to adapt to an ever-changing ecosystem of Android third-party companies.The works presented in this thesis were partially funded within the framework of the following projects and grants: • European Union’s Horizon 2020 Innovation Action program (Grant Agreement No. 786741, SMOOTH Project and Grant Agreement No. 101021377, TRUST AWARE Project). • Spanish Government ODIO NºPID2019-111429RB-C21/PID2019-111429RBC22. • The Spanish Data Protection Agency (AEPD) • AppCensus Inc.This work has been supported by IMDEA Networks InstitutePrograma de Doctorado en Ingeniería Telemática por la Universidad Carlos III de MadridPresidente: Srdjan Matic.- Secretario: Guillermo Suárez-Tangil.- Vocal: Ben Stoc

    Congestion control in wireless sensor networks

    Get PDF
    Information-sensing and data-forwarding in Wireless Sensor Networks (WSN) often incurs high traffic demands, especially during event detection and concurrent transmissions. Managing such large amounts of data remains a considerable challenge in resource-limited systems like WSN, which typically observe a many-to-one transmission model. The result is often a state of constant buffer-overload or congestion, preventing desirable performance to the extent of collapsing an entire network. The work herein seeks to circumvent congestion issues and its negative effects in WSN and derivative platforms such as Body Sensor Networks (BSN). The recent proliferation of WSN has emphasized the need for high Quality-of-Service (QoS) in applications involving real-time and remote monitoring systems such as home automation, military surveillance, environmental hazard detection, as well as BSN-based healthcare and assisted-living systems. Nevertheless, nodes in WSN are often resource-starved as data converges and cause congestion at critical points in such networks. Although this has been a primal concern within the WSN field, elementary issues such as fairness and reliability that directly relate to congestion are still under-served. Moreover, hindering loss of important packets, and the need to avoid packet entrapment in certain network areas remain salient avenues of research. Such issues provide the motivation for this thesis, which lead to four research concerns: (i) reduction of high-traffic volumes; (ii) optimization of selective packet discarding; (iii) avoidance of infected areas; and (iv) collision avoidance with packet-size optimization. Addressing these areas would provide for high QoS levels, and pave the way for seamless transmissions in WSN. Accordingly, the first chapter attempts to reduce the amount of network traffic during simultaneous data transmissions, using a rate-limiting technique known as Relaxation Theory (RT). The goal is for substantial reductions in otherwise large data-streams that cause buffer overflows. Experimentation and analysis with Network Simulator 2 (NS-2), show substantial improvement in performance, leading to our belief that RT-MMF can cope with high incoming traffic scenarios and thus, avoid congestion issues. Whilst limiting congestion is a primary objective, this thesis keenly addresses subsequent issues, especially in worst-case scenarios where congestion is inevitable. The second research question aims at minimizing the loss of important packets crucial to data interpretation at end-systems. This is achieved using the integration of selective packet discarding and Multi-Objective Optimization (MOO) function, contributing to the effective resource-usage and optimized system. A scheme was also developed to detour packet transmissions when nodes become infected. Extensive evaluations demonstrate that incoming packets are successfully delivered to their destinations despite the presence of infected nodes. The final research question addresses packet collisions in a shared wireless medium using distributed collision control that takes packet sizes into consideration. Performance evaluation and analysis reveals desirable performance that are resulted from a strong consideration of packet sizes, and the effect of different Bit Error Rates (BERs)

    Blockchain for Internet of Things:Data Markets, Learning, and Sustainability

    Get PDF

    Raspberry Pi Technology

    Get PDF

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modied our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the eld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
    corecore