60 research outputs found

    Toward Open and Programmable Wireless Network Edge

    Get PDF
    Increasingly, the last hop connecting users to their enterprise and home networks is wireless. Wireless is becoming ubiquitous not only in homes and enterprises but in public venues such as coffee shops, hospitals, and airports. However, most of the publicly and privately available wireless networks are proprietary and closed in operation. Also, there is little effort from industries to move forward on a path to greater openness for the requirement of innovation. Therefore, we believe it is the domain of university researchers to enable innovation through openness. In this thesis work, we introduce and defines the importance of open framework in addressing the complexity of the wireless network. The Software Defined Network (SDN) framework has emerged as a popular solution for the data center network. However, the promise of the SDN framework is to make the network open, flexible and programmable. In order to deliver on the promise, SDN must work for all users and across all networks, both wired and wireless. Therefore, we proposed to create new modules and APIs to extend the standard SDN framework all the way to the end-devices (i.e., mobile devices, APs). Thus, we want to provide an extensible and programmable abstraction of the wireless network as part of the current SDN-based solution. In this thesis work, we design and develop a framework, weSDN (wireless extension of SDN), that extends the SDN control capability all the way to the end devices to support client-network interaction capabilities and new services. weSDN enables the control-plane of wireless networks to be extended to mobile devices and allows for top-level decisions to be made from an SDN controller with knowledge of the network as a whole, rather than device centric configurations. In addition, weSDN easily obtains user application information, as well as the ability to monitor and control application flows dynamically. Based on the weSDN framework, we demonstrate new services such as application-aware traffic management, WLAN virtualization, and security management

    VĂ”rguaja protokolli serveri arenduse ja toimivuse analĂŒĂŒs

    Get PDF
    KĂ€esolev magistritöö kirjeldab lihtsa vĂ”rguaja protokolli (NTP) serveri ehitamist monoplaatarvutisse Tartu Observatooriumi aatomikella tarbeks. See selgitab NTP-protokolli terminoloogiat ja on loodud NTP-serveri ja kliendi jaoks. MÔÔtmise eesmĂ€rgil kirjeldatakse ka seda, kuidas ehitatatakse NTP-klienti, mis genereerib impulssi sekundis, mis pĂ”hineb NTP-kellaajale. Selle kasutamise tulemusi vĂ”rreldakse NTP plotteri testitulemustega. SeejĂ€rel hinnatakse NTP-serveri eksperimentaalset konfiguratsiooni, millele jĂ€rgneb arutelu vĂ”imalike paranduste ja tulevaste projektide ĂŒle.This Master thesis describes the process of building a simple network time protocol (NTP) server on a single-board computer for the Atomic clock at Tartu Observatory. It explains the terminology of NTP protocol and set up for the NTP server. It also describes how to build a NTP client which generates pulse per second by its own script for the measurement purposes. This new pulse is synchronized with the NTP timestamp. Results of its use are compared against the test results from NTP plotter. The experimental configuration of the NTP server is then evaluated which is followed by a discussion regarding possible improvements and future projects

    Investigating wireless network deployment configurations for marginalized areas

    Get PDF
    In recent years, immense effort has been channelled towards the Information and Technological development of rural areas. To support this development, telecommunication networks have been deployed. The availability of these telecommunication networks is expected to improve the way people share ideas and communicate locally and globally, reducing limiting factors like distance through the use of the Internet. The major problem for these networks is that very few of them have managed to stay in operation over long periods of time. One of the major causes of this failure is the lack of proper monitoring and management as, in some cases, administrators are located far away from the network site. Other factors that contribute to the frequent failure of these networks are lack of proper infrastructure, lack of a constant power supply and other environmental issues. A telecommunication network was deployed for the people of Dwesa by the Siyakhula Living Lab project. During this research project, frequent visits were made to the site and network users were informally interviewed in order to gain insight into the network challenges. Based on the challenges, different network monitoring systems and other solutions were deployed on the network. This thesis analyses the problems encountered and presents possible and affordable solutions that were implemented on the network. This was done to improve the network‟s reliability, availability and manageability whilst exploring possible and practical ways in which the connectivity of the deployed telecommunication network can be maintained. As part of these solutions, a GPRS redundant link, Nagios and Cacti monitoring systems as well as Simple backup systems were deployed. v Acronyms AC Access Concentrators AMANDA Automatic Marylyn Network Disk Archiver CDMA Code Divison Multiple Access CGI Common Gateway Interface

    The Wireless Body Area Sensor Networks and Routing Strategies: Nomenclature and Review of Literature

    Get PDF
    WBASN is an effective solution that has been proposed in terms of improving the solutions and there are varied benefits that have been achieved from the usage of WBASN solutions in communication, healthcare domain. From the review of stats on rising number of wireless devices and solutions that are coming up which is embraced by the people as wearable devices, implants for medical diagnostic solutions, etc. reflect upon the growing demand for effective models. However, the challenge is about effective performance of such solutions with optimal efficiency. Due to certain intrinsic factors like numerous standards that are available, and also due to the necessity for identifying the best solutions that are based on application requirements. Some of the key issues that have to be considered in the process of WBASN are about the impacts that are taking place from the wireless medium, the lifetime of batteries in the WBASN devices and the other significant condition like the coexistence of the systems among varied other wireless networks that are constituted in the proximity. In this study, scores of models that has been proposed pertaining to MAC protocols for WBASN solutions has been reviewed to understand the efficacy of the existing systems, and a scope for process improvement has been explored for conducting in detail research and developing a solution

    Wireless Device Key Generation

    Get PDF
    Security is an important concern in today’s society. While securing communications is difficult to accomplish, securing wireless communications is the most difficult due to its broadcast nature and the randomness of wireless channels. Current physical layer security approaches argue that channel randomness can be exploited to ensure secure communications. The wireless channel between communicating users can be used to generate secret keys known only to them. It would be nearly impossible for a user eavesdropping on their communications to generate this same key due to inherent differences in channel properties. This approach for wireless key generation is discussed, implemented, and tested using various scenarios to prove that the communication over the wireless medium is secure

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system

    Telecommunication Systems

    Get PDF
    This book is based on both industrial and academic research efforts in which a number of recent advancements and rare insights into telecommunication systems are well presented. The volume is organized into four parts: "Telecommunication Protocol, Optimization, and Security Frameworks", "Next-Generation Optical Access Technologies", "Convergence of Wireless-Optical Networks" and "Advanced Relay and Antenna Systems for Smart Networks." Chapters within these parts are self-contained and cross-referenced to facilitate further study

    Cost-effective Information and Communication Technology (ICT) infrastructure for Tanziania

    Get PDF
    The research conducted an Information and Communication Technology (ICT) field survey, the results revealed that Tanzania is still lagging behind in the ICT sector due to the lack of an internationally connected terrestrial ICT infrastructure; Internet connectivity to the rest of the world is via expensive satellite links, thus leaving the majority of the population unable to access the Internet services due to its high cost. Therefore, an ICT backbone infrastructure is designed that exploits optical DWDM network technology, which un-locks bandwidth bottlenecks and provides higher capacity which will provide ICT services such as Internet, voice, videos and other multimedia interactions at an affordable cost to the majority of the people who live in the urban and rural areas of Tanzania. The research analyses and compares the performance, and system impairments, in a DWDM system at data transmission rates of 2.5 Gb/s and 10 Gb/s per wavelength channel. The simulation results show that a data transmission rate of 2.5 Gb/s can be successfully transmitted over a greater distance than 10 Gb/s with minimum system impairments. Also operating at the lower data rate delivers a good system performance for the required ICT services. A forty-channel DWDM system will provide a bandwidth of 100 Gb/s. A cost analysis demonstrates the economic worth of incorporating existing optical fibre installations into an optical DWDM network for the creation of an affordable ICT backbone infrastructure; this approach is compared with building a completely new optical fibre DWDM network or a SONET/SDH network. The results show that the ICT backbone infrastructure built with existing SSMF DWDM network technology is a good investment, in terms of profitability, even if the Internet charges are reduced to half current rates. The case for building a completely new optical fibre DWDM network or a SONET/SDH network is difficult to justify using current financial data

    Smart Monitoring and Control in the Future Internet of Things

    Get PDF
    The Internet of Things (IoT) and related technologies have the promise of realizing pervasive and smart applications which, in turn, have the potential of improving the quality of life of people living in a connected world. According to the IoT vision, all things can cooperate amongst themselves and be managed from anywhere via the Internet, allowing tight integration between the physical and cyber worlds and thus improving efficiency, promoting usability, and opening up new application opportunities. Nowadays, IoT technologies have successfully been exploited in several domains, providing both social and economic benefits. The realization of the full potential of the next generation of the Internet of Things still needs further research efforts concerning, for instance, the identification of new architectures, methodologies, and infrastructures dealing with distributed and decentralized IoT systems; the integration of IoT with cognitive and social capabilities; the enhancement of the sensing–analysis–control cycle; the integration of consciousness and awareness in IoT environments; and the design of new algorithms and techniques for managing IoT big data. This Special Issue is devoted to advancements in technologies, methodologies, and applications for IoT, together with emerging standards and research topics which would lead to realization of the future Internet of Things
    • 

    corecore