199 research outputs found

    An eco-friendly hybrid urban computing network combining community-based wireless LAN access and wireless sensor networking

    Get PDF
    Computer-enhanced smart environments, distributed environmental monitoring, wireless communication, energy conservation and sustainable technologies, ubiquitous access to Internet-located data and services, user mobility and innovation as a tool for service differentiation are all significant contemporary research subjects and societal developments. This position paper presents the design of a hybrid municipal network infrastructure that, to a lesser or greater degree, incorporates aspects from each of these topics by integrating a community-based Wi-Fi access network with Wireless Sensor Network (WSN) functionality. The former component provides free wireless Internet connectivity by harvesting the Internet subscriptions of city inhabitants. To minimize session interruptions for mobile clients, this subsystem incorporates technology that achieves (near-)seamless handover between Wi-Fi access points. The WSN component on the other hand renders it feasible to sense physical properties and to realize the Internet of Things (IoT) paradigm. This in turn scaffolds the development of value-added end-user applications that are consumable through the community-powered access network. The WSN subsystem invests substantially in ecological considerations by means of a green distributed reasoning framework and sensor middleware that collaboratively aim to minimize the network's global energy consumption. Via the discussion of two illustrative applications that are currently being developed as part of a concrete smart city deployment, we offer a taste of the myriad of innovative digital services in an extensive spectrum of application domains that is unlocked by the proposed platform

    Wireless Handheld Solution for the Gaming Industry

    Get PDF
    of the essential elements of success in the gaming industry is the requirement of providing exceptional customer service. Technology plays a significant role in bringing state of the art solutions that enhance the overall customer experience. Currently a guest must go through multiple steps and a variety of departments to simply resolve issues with their player accounts (loyalty programs), update customer profiles, book hotel and restaurant reservations, sign up for promotions, etc. In order to effectively take care of these customers in both a timely and efficient manner, a wireless handheld device is needed that employees can carry with them to resolve and address these concerns. This project is aimed at identifying the proper wireless infrastructure for the gaming environment and also the wireless handheld device, such as an Ultra Mobile PC (UMPC) to effectively and efficiently take care of customers

    Multidimensional Participation in Hybrid Wireless Communities

    Get PDF
    Wireless communities have been long considered an interesting approach to provide mobile Internet, but the key issue is whether they are able to attract and retain a critical mass of active members. It is therefore crucial to understand what motivates and dissuades people from joining and participating in them, especially with the development of mainstream 3G technologies, in order to evaluate their potential development. This paper analyzes motivations and barriers influencing participation in a large wireless community – Fon – based on a survey of 268 members. Two distinct forms of participation driven by different motivations emerge: a ‘participation by sharing’ driven by idealistic motivation and a ‘social participation’ driven by social motives and technical interest. Utilitarian motivations do not play a major role for active participation despite being crucial in attracting members to the community. Accordingly, the way hybrid wireless communities are currently designed (hardly offering occasions for a social usage experience, experimentation and with decreasing utilitarian benefits due the development of 3G technologies) is casting serious doubts about a possible potential development above the status of a niche complement to the dominant cellular technologies

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue President\u27s Message From the ACUTA CEO Legislative/Regulatory Update Foundations of Collaboration Leveraging City infrastructure to Extend Campus Wireless Out with the Old (eMail) and in with the New (Collaboration Tools) 8 Steps to a Successful Very-High- Density Wi-Fi Serving Up Student-Centric Technology Preparing for the Unexpected with Emergency Mass Notification Systems UT San Antonio Encourages Collaboration lU Knows the Value of Partnerships Western University Community Colleges of Spokane University of Richmond Centre College University of New Mexic

    A deception based framework for the application of deceptive countermeasures in 802.11b wireless networks

    Get PDF
    The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were investigated to provide an understanding of how deception may be used in network security. Deceptive network countermeasures and attacks may then be tested on a wireless honeypot as an investigation into the effectiveness of deceptions used in network security. A structured framework, that describes the type of deception and its modus operandi, was utilised to deploy existing honeypot technologies for intrusion detection. Network countermeasures and attacks were mapped to deception types in the framework. This enabled the honeypot to appear as a realistic network and deceive targets in varying deceptive conditions. The investigation was to determine if particular deceptive countermeasures may reduce the effectiveness of particular attacks. The effectiveness of deceptions was measured, and determined by the honeypot\u27s ability to fool the attacking tools used. This was done using brute force network attacks on the wireless honeypot. The attack tools provided quantifiable forensic data from network sniffing, scans, and probes of the wireless honeypot. The aim was to deceive the attack tools into believing a wireless network existed, and contained vulnerabilities that may be further exploited by the naive attacker

    Digital Revolution, Cyber-Crimes And Cyber Legislation: A Challenge To Governments In Developing Countries

    Get PDF
    Cyber-crimes the off-spring of cyber-space technology could be only monitored; controlled and prevented through cyber-legislation. Countries around the globe are facing the dangers of cyber-crimes due to several reasons ranging from the poor technology, incapacity and absence of legislation to financial constraints, lack of cooperation with international law and enforcing agencies. This study was undertaken to asses and analyzes the present state of cyber-crimes and legislation in the perspective of developing countries and to identify and analyze the challenges the governments of developing countries are facing in prevention of the cyber-crimes in general and focusing Pakistan being developing economy in particular and to suggest way-out. This qualitative study used ATLAS.ti software for data analyses. Hermeneutics, discourse and heuristic methods were employed to analyze the qualitative data. Experts suggested the use of different approaches for cyber-legislation for example the minimalist approach and prescriptive approach. However, this study proposes the use of two-tier approach for cyber-legislation against the cyber-crimes in developing countries and Pakistan. Key Words: Cyber-space, Cyber-crimes, Cyber-laws, Minimalist approach, Prescriptive approach, Two-Tier approach

    ResearchNews, Volume 8, 2014.

    Get PDF

    Boston Unplugged: Mapping a Wireless Future

    Get PDF
    Reviews a variety of models that would allow Boston to provide free or low-cost high-speed Internet access citywide. Outlines the benefits and mechanics of citywide WiFi, and lists factors to consider in designing, developing, and deploying a system
    • …
    corecore