13,607 research outputs found
Peer-assisted location authentication and access control for wireless networks
This paper presents the development and implementation of a locationâbased, lightweight peerâassisted authentication scheme for use in wireless networks. The notion of peerâassisted authentication is based upon some target user equipmentâ (UE) seeking authentication and access to a network based upon its physical location. The target UE seeks authentication through the UE of peers in the same network. Compared with previous work, the approach in this paper does not rely on any cryptographic proofs from a central authentication infrastructure, thus avoiding complex infrastructure management. However, the peerâassisted authentication consumes network channel resources which will impact on network performance. In this paper, we also present an access control algorithm for balancing the location authentication, network quality of service (QoS), network capacity and time delay. The results demonstrate that peerâassisted authentication considering location authentication and system QoS through dynamic access control strategies can be effectively and efficiently implemented in a number of use cases
ICT-based reforms in local government decision-making in the gram panchayats of Kerala
The beneficial impact of computerisation can be felt in all elements that contribute to decision-making in panchayats in the state of Kerala. However, even though computerisation is bringing about immense improvements compared to traditional administrative practices, but scope still remains for further improvement. Instead of the 'as it is' computerisation that is mostly carried out a process based approach is needed
Certified Universal Gathering in for Oblivious Mobile Robots
We present a unified formal framework for expressing mobile robots models,
protocols, and proofs, and devise a protocol design/proof methodology dedicated
to mobile robots that takes advantage of this formal framework. As a case
study, we present the first formally certified protocol for oblivious mobile
robots evolving in a two-dimensional Euclidean space. In more details, we
provide a new algorithm for the problem of universal gathering mobile oblivious
robots (that is, starting from any initial configuration that is not bivalent,
using any number of robots, the robots reach in a finite number of steps the
same position, not known beforehand) without relying on a common orientation
nor chirality. We give very strong guaranties on the correctness of our
algorithm by proving formally that it is correct, using the COQ proof
assistant. This result demonstrates both the effectiveness of the approach to
obtain new algorithms that use as few assumptions as necessary, and its
manageability since the amount of developed code remains human readable.Comment: arXiv admin note: substantial text overlap with arXiv:1506.0160
Requirements traceability in model-driven development: Applying model and transformation conformance
The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship, which helps in assessing the quality of models, realizations and transformation specifications. Our framework is a basis for understanding requirements traceability in model-driven development, as well as for the design of tools that support requirements traceability in model-driven development processes. We propose a notion of conformance between application models which reduces the effort needed for assessment activities. We discuss how this notion of conformance can be integrated with model transformations
CHILDREN AIMED INTERFACES FOR ANDROID RUNNING DEVICES
The paper focuses on the development of mobile interfaces for children. The Android operating system is presented from appearance with its features, hardware support and its advantages over others operating systems. Mobile software development requirements on different platforms for mobile devices are identified and described. A graphical interface aiming children is designed and its features are presented. The interface includes an application for managing the school related tasks and time. Children manage the time of the days of the week differently. They have access to a task management system and a progress reporting tool. The advantages and development requirements are identified and discussed.mobile, software, development, Android, devices, interfaces, children
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts
but also to generate cryptograms that, contrary to the classic goal of
cryptography, are meant to be broken. These cryptograms, generally called
puzzles, require the use of a certain amount of resources to be solved, hence
introducing a cost that is often regarded as a time delay---though it could
involve other metrics as well, such as bandwidth. These powerful features have
made puzzles the core of many security protocols, acquiring increasing
importance in the IT security landscape. The concept of a puzzle has
subsequently been extended to other types of schemes that do not use
cryptographic functions, such as CAPTCHAs, which are used to discriminate
humans from machines. Overall, puzzles have experienced a renewed interest with
the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In
this paper, we provide a comprehensive study of the most important puzzle
construction schemes available in the literature, categorizing them according
to several attributes, such as resource type, verification type, and
applications. We have redefined the term puzzle by collecting and integrating
the scattered notions used in different works, to cover all the existing
applications. Moreover, we provide an overview of the possible applications,
identifying key requirements and different design approaches. Finally, we
highlight the features and limitations of each approach, providing a useful
guide for the future development of new puzzle schemes.Comment: This article has been accepted for publication in ACM Computing
Survey
Deaf, Dumb, and Chatting Robots, Enabling Distributed Computation and Fault-Tolerance Among Stigmergic Robot
We investigate ways for the exchange of information (explicit communication)
among deaf and dumb mobile robots scattered in the plane. We introduce the use
of movement-signals (analogously to flight signals and bees waggle) as a mean
to transfer messages, enabling the use of distributed algorithms among the
robots. We propose one-to-one deterministic movement protocols that implement
explicit communication. We first present protocols for synchronous robots. We
begin with a very simple coding protocol for two robots. Based on on this
protocol, we provide one-to-one communication for any system of n \geq 2 robots
equipped with observable IDs that agree on a common direction (sense of
direction). We then propose two solutions enabling one-to-one communication
among anonymous robots. Since the robots are devoid of observable IDs, both
protocols build recognition mechanisms using the (weak) capabilities offered to
the robots. The first protocol assumes that the robots agree on a common
direction and a common handedness (chirality), while the second protocol
assumes chirality only. Next, we show how the movements of robots can provide
implicit acknowledgments in asynchronous systems. We use this result to design
asynchronous one-to-one communication with two robots only. Finally, we combine
this solution with the schemes developed in synchronous settings to fit the
general case of asynchronous one-to-one communication among any number of
robots. Our protocols enable the use of distributing algorithms based on
message exchanges among swarms of Stigmergic robots. Furthermore, they provides
robots equipped with means of communication to overcome faults of their
communication device
- âŠ