34 research outputs found
Contributions to Vehicular Communications Systems and Schemes
La dernière décennie a marqué une grande hausse des applications véhiculaires comme une nouvelle source de revenus et un facteur de distinction dans l'industrie des véhicules. Ces applications véhiculaires sont classées en deux groupes : les applications de sécurité et les
applications d'info divertissement. Le premier groupe inclue le changement intelligent de voie, l'avertissement de dangers de routes et la prévention coopérative de collision qui comprend la vidéo sur demande (VoD), la diffusion en direct, la diffusion de météo et de nouvelles et les jeux
interactifs. Cependant, Il est à noter que d'une part, les applications véhiculaires d'info divertissement nécessitent une bande passante élevée et une latence relativement faible ; D'autre part, les applications de sécurité requièrent exigent un délai de bout en bout très bas et un canal de
communication fiable pour la livraison des messages d'urgence. Pour satisfaire le besoin en applications efficaces, les fabricants de véhicules ainsi que la
communauté académique ont introduit plusieurs applications à l’intérieur de véhicule et entre véhicule et véhicule (V2V). Sauf que, l'infrastructure du réseau sans fil n'a pas été conçue pour gérer les applications de véhicules, en raison de la haute mobilité des véhicules, de l'imprévisibilité
du comportement des conducteurs et des modèles de trafic dynamiques. La relève est l'un des principaux défis des réseaux de véhicules, car la haute mobilité exige au
réseau sans fil de faire la relève en un très court temps. De plus, l'imprévisibilité du comportement du conducteur cause l'échec des protocoles proactifs traditionnels de relève, car la prédiction du prochain routeur peut changer en fonction de la décision du conducteur. Aussi, le réseau de véhicules peut subir une mauvaise qualité de service dans les régions de relève en raison d'obstacles naturels, de véhicules de grande taille ou de mauvaises conditions météorologiques. Cette thèse se concentre sur la relève dans l'environnement des véhicules et son effet sur les
applications véhiculaires. Nous proposons des solutions pratiques pour les réseaux actuellement déployés, principalement les réseaux LTE, l'infrastructure véhicule à véhicule (V2V) ainsi que les outils efficaces d’émulateurs de relèves dans les réseaux véhiculaires.----------ABSTRACT: The last decade marked the rise of vehicular applications as a new source of revenue and a key differentiator in the vehicular industry. Vehicular Applications are classified into safety and infotainment applications. The former include smart lane change, road hazard warning, and
cooperative collision avoidance; however, the latter include Video on Demand (VoD), live streaming, weather and news broadcast, and interactive games. On one hand, infotainment
vehicular applications require high bandwidth and relatively low latency; on the other hand, safety applications requires a very low end to end delay and a reliable communication channel to deliver emergency messages. To satisfy the thirst for practical applications, vehicle manufacturers along with research institutes introduced several in-vehicle and Vehicle to Vehicle (V2V) applications. However, the wireless
network infrastructure was not designed to handle vehicular applications, due to the high mobility of vehicles, unpredictability of drivers’ behavior, and dynamic traffic patterns. Handoff is one of the main challenges of vehicular networks since the high mobility puts pressure on the wireless network to finish the handoff within a short period. Moreover, the unpredictability of driver behavior causes the traditional proactive handoff protocols to fail, since the prediction of the next router may change based on the driver’s decision. Moreover, the vehicular network may
suffer from bad Quality of Service (QoS) in the regions of handoff due to natural obstacles, large vehicles, or weather conditions. This thesis focuses on the handoff on the vehicular environment and its effect on the vehicular
applications. We consider practical solutions for the currently deployed networks mainly Long Term Evolution (LTE) networks, the Vehicle to Vehicle (V2V) infrastructure, and the tools that can be used effectively to emulate handoff on the vehicular networks
Secure covert communications over streaming media using dynamic steganography
Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems get really serious. This thesis describes a theoretical and experimental investigation of secure covert communications over streaming media using dynamic steganography. A covert VoIP communications system was developed in C++ to enable the implementation of the work being carried out.
A new information theoretical model of secure covert communications over streaming media was constructed to depict the security scenarios in streaming media-based steganographic systems with passive attacks. The model involves a stochastic process that models an information source for covert VoIP communications and the theory of hypothesis testing that analyses the adversary‘s detection performance.
The potential of hardware-based true random key generation and chaotic interval selection for innovative applications in covert VoIP communications was explored. Using the read time stamp counter of CPU as an entropy source was designed to generate true random numbers as secret keys for streaming media steganography. A novel interval selection algorithm was devised to choose randomly data embedding locations in VoIP streams using random sequences generated from achaotic process.
A dynamic key updating and transmission based steganographic algorithm that includes a one-way cryptographical accumulator integrated into dynamic key exchange for covert VoIP communications, was devised to provide secure key exchange for covert communications over streaming media. The discrete logarithm problem in mathematics and steganalysis using t-test revealed the algorithm has the advantage of being the most solid method of key distribution over a public channel.
The effectiveness of the new steganographic algorithm for covert communications over streaming media was examined by means of security analysis, steganalysis using non parameter Mann-Whitney-Wilcoxon statistical testing, and performance and robustness measurements. The algorithm achieved the average data embedding rate of 800 bps, comparable to other related algorithms. The results indicated that the algorithm has no or little impact on real-time VoIP communications in terms of speech quality (< 5% change in PESQ with hidden data), signal distortion (6% change in SNR after steganography) and imperceptibility, and it is more secure and effective in addressing the security problems than other related algorithms
Teaching Your Wireless Card New Tricks: Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications
Smartphones come with a variety of sensors and communication interfaces, which make them perfect candidates for mobile communication testbeds. Nevertheless, proprietary firmwares hinder us from accessing the full capabilities of the underlying hardware platform which impedes innovation. Focusing on FullMAC Wi-Fi chips, we present Nexmon, a C-based firmware modification framework. It gives access to raw Wi-Fi frames and advanced capabilities that we found by reverse engineering chips and their firmware. As firmware modifications pose security risks, we discuss how to secure firmware handling without impeding experimentation on Wi-Fi chips. To present and evaluate our findings in the field, we developed the following applications. We start by presenting a ping-offloading application that handles ping requests in the firmware instead of the operating system. It significantly reduces energy consumption and processing delays. Then, we present a software-defined wireless networking application that enhances scalable video streaming by setting flow-based requirements on physical-layer parameters. As security application, we present a reactive Wi-Fi jammer that analyses incoming frames during reception and transmits arbitrary jamming waveforms by operating Wi-Fi chips as software-defined radios (SDRs). We further introduce an acknowledging jammer to ensure the flow of non-targeted frames and an adaptive power-control jammer to adjust transmission powers based on measured jamming successes. Additionally, we discovered how to extract channel state information (CSI) on a per-frame basis. Using both SDR and CSI-extraction capabilities, we present a physical-layer covert channel. It hides covert symbols in phase changes of selected OFDM subcarriers. Those manipulations can be extracted from CSI measurements at a receiver. To ease the analysis of firmware binaries, we created a debugging application that supports single stepping and runs as firmware patch on the Wi-Fi chip. We published the source code of our framework and our applications to ensure reproducibility of our results and to enable other researchers to extend our work. Our framework and the applications emphasize the need for freely modifiable firmware and detailed hardware documentation to create novel and exciting applications on commercial off-the-shelf devices
Towards large scale software based network routing simulation
Software based routing simulators suffer from large simulation host requirements and are prone to slow downs because of resource limitations, as well as context switching due to user space to kernel space requests. Furthermore, hardware based simulations do not scale with the passing of time as their available resources are set at the time of manufacture. This research aims to provide a software based, scalable solution to network simulation. It aims to achieve this by a Linux kernel-based solution, through insertion of a custom kernel module. This will reduce the number of context switches by eliminating the user space context requirement, and serve to be highly compatible with any host that can run the Linux kernel. Through careful consideration in data structure choice and software component design, this routing simulator achieved results of over 7 Gbps of throughput over multiple simulated node hops on consumer hardware. Alongside this throughput, this routing simulator also brings to light scalability and the ability to instantiate and simulate networks in excess of 1 million routing nodes within 1 GB of system memor
Thermodynamic and parametric modeling in the refining of high carbon ferrochromium alloys using manually operated AODs
M.Sc. (50/50) Research project submitted to
School of Chemical and Metallurgical Engineering, Faculty of Engineering and the Built Environment, University of the Witwatersrand, Johannesburg, South Africa
July 2017This study and the work done involves investigating the effects of different parameters on the decarburization process of high carbon ferrochromium melts to produce medium carbon ferrochrome, and takes into account the manipulation of the different parameters and thermodynamic models based on actual plant data. Process plant data was collected from a typical plant producing medium carbon ferrochrome alloys using AODs. The molten alloy was tapped from the EAF and charged into the AOD for decarburization using oxygen and nitrogen gas mixtures. The gases were blown into the converter through the bottom tuyeres. Metal and slag samples and temperature measurements were taken throughout the duration of each heat. The decarburization process was split into two main intervals namely first stage blow (where carbon content in the metal bath is between 2-8 wt. % C) and second stage blow (carbon mass% below 2 wt. %). The first and second blow stages were differentiated by the gas flow rates whereby the first stage was signified by gas flow ratio of 2:1 (O2:N2), whilst the stage blow had 1:1 ratio of oxygen and nitrogen respectively.
The effect of Cr mass% on carbon activity and how it relates to rate of decarburization was investigated, and the results indicated that an increase in Cr 66.54 – 70.5 wt. % reduced carbon activity in the metal bath from 0.336 – 0.511 for the first blowing stage. For the second blowing stage, the increase in Cr mass % of 67.22 – 71.65 wt. % resulted in an increase in C activity from 0.336 – 0.57. The trend showed that an increase in chromium composition resulted in a decrease in carbon activity and the same increase in Cr mass% resulted in reduced carbon solubility.
Based on the plant data, it was observed that the rate of decarburization was time dependent, that is, the longer the decarburization time interval, the better the carbon removal from the metal bath. An interesting observation was that the change in carbon mass percent from the initial composition to the final (Δ%C) decreased from 10.18 – 8.37 wt. % with the increase in Cr/C ratio from 8.37 – 10.18. This effect was attributed to the chromium affinity for carbon and the fact that an increase in chromium content in the bath was seen to reduce activity of carbon. It was also observed that the effect of the Cr/C ratio was more significant in the first stage of the blowing process compared to the second blowing stage. A mass and energy balance model was constructed for the process under study to predict composition of the metal bath at any time interval under specified plant conditions and parameters. The model was used to predict the outcome of the process by manipulating certain parameters to achieve a set target. By keeping
the gas flow rates, blowing times, gas ratios and initial metal bath temperature unchanged, the effect of initial temperature on decarburization in the converter was investigated. The results showed that the carbon end point with these parameters fixed decreased with increasing initial temperature, and this was supported by literature. The partial pressure of oxygen was observed to increase with decrease in C mass % between the first and second blow stages. For the second stage blow the partial pressure changed from 5.52*10-12 – 2.1*10-10 and carbon mass % increased from 0.754 – 2.99 wt. %. A carbon mass % of 7.87 had an oxygen partial pressure of 4.51*10-13 whilst a lower carbon content of 1.53 wt. % had an oxygen partial pressure of 8.06*10-11. The CO partial pressure however increased with increase in carbon composition in the metal bath.
When the oxygen flow rate increased, a corresponding increase in the carbon removed (Δ%C) was observed. For the first stage of the blowing process, an increase in oxygen flow rate from 388.67 – 666.5Nm3 resulted in an increase in carbon removed from 5.06 – 7.28 wt. %. The second blowing stage had lower oxygen flow rates because of the carbon levels remaining in the metal bath were around +/- 2 wt. %. In this stage oxygen flow rates increased from 125 – 286.67 Nm3 and carbon removed (Δ%C) from 0.16 – 2.093 wt. %. The slag showed that an increase in basicity resulted in an increase in Cr2O3 in the slag. As the basicity increased from 0.478 – 1.281, this resulted in an increase in Cr2O3 increase from 0.26 – 0.68. Nitrogen solubility in the metal bath was investigated and it was observed that it increased with increasing Cr mass %. The increase in nitrogen solubility with increasing Cr mass % was independent of the nitrogen partial pressures.MT201
154th Municipal government report fiscal year July 1, 2006 - June 30, 2007.
This is an annual report containing vital statistics for a town/city in the state of New Hampshire
156th Municipal government report fiscal year July 1, 2008 - June 30, 2009.
This is an annual report containing vital statistics for a town/city in the state of New Hampshire
Actas da 10ª Conferência sobre Redes de Computadores
Universidade do MinhoCCTCCentro AlgoritmiCisco SystemsIEEE Portugal Sectio
Town of Pelham, New Hampshire 1989 annual town report.
This is an annual report containing vital statistics for a town/city in the state of New Hampshire