5,916 research outputs found
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
On Content-centric Wireless Delivery Networks
The flux of social media and the convenience of mobile connectivity has
created a mobile data phenomenon that is expected to overwhelm the mobile
cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the
growth rate of wireless data has far exceeded the capacity increase of the
mobile networks. A fundamentally new design paradigm is required to tackle the
ever-growing wireless data challenge.
In this article, we investigate the problem of massive content delivery over
wireless networks and present a systematic view on content-centric network
design and its underlying challenges. Towards this end, we first review some of
the recent advancements in Information Centric Networking (ICN) which provides
the basis on how media contents can be labeled, distributed, and placed across
the networks. We then formulate the content delivery task into a content rate
maximization problem over a share wireless channel, which, contrasting the
conventional wisdom that attempts to increase the bit-rate of a unicast system,
maximizes the content delivery capability with a fixed amount of wireless
resources. This conceptually simple change enables us to exploit the "content
diversity" and the "network diversity" by leveraging the abundant computation
sources (through application-layer encoding, pushing and caching, etc.) within
the existing wireless networks. A network architecture that enables wireless
network crowdsourcing for content delivery is then described, followed by an
exemplary campus wireless network that encompasses the above concepts.Comment: 20 pages, 7 figures,accepted by IEEE Wireless
Communications,Sept.201
Management of e-technology in China
"e" technology is bringing about many challenges for companies, in particular for their managers. This concerns a vast range of business processes in many sectors of the economy and in nearly every country of the world. In rapidly industrializing China, companies and other organizations are actively finding their way by adapting, developing and exploiting new e-technologies. The paper's focus is the identification of the management issues in implementing e-technology in China. The paper reports on research into difficulties of establishing and operating e-business in China. In particular, it discusses management related to e-technology sharing and application. A brief review of literature is followed by the analysis of three recent case studies: an international IT services alliance, a financial services provider and an international manufacturing joint venture. All case companies are applying e-technology in China, but the role of e-technology differs in the three cases: adding a service line to the existing business processes; developing a new business process; and increasing efficiency and effectiveness in business processes. The conclusions present the emerging management issues: cooperation is a key asset in networking; the choice of business models plays an important role; adequate management attention for details such as a training program is require
Concurrent collaboration in research and development
Integration is the essence of current research and development (R&D) activity in many organizations. Integration can be established in various ways depending on the type, size and intricacy in organizational functions and products. Nevertheless, research and development (R&D) has become an inevitable function in most manufacturing companies in order to develop their own product niches for their survival in the prevailing highly completion market environment. Research and development functions are fundamental drivers of value creation in technology based enterprises. Of creating and maintaining a vibrant R&D environment, organizations individually or collectively need to incorporate virtual R&D team. A virtual R\&D team can introduce new product in less lead time than by conventional R\&D working. Therefore, how to increase the possibility of having more successful R\&D is a critical issue for enterprises. This paper examines the current approach of collaboration in R\&D issues from the perspective of their impact on virtual R\&D team in enterprises and compares the findings with the other concepts of concurrent collaboration. By reviewing literature and theories, the paper firstly presents the definition and characteristics of virtual R&D teams. A comparison of different types of virtual R&D teams along with the strengths and limitations of the preceding studies in this area are also presented. It is observed that most of the research activities encourage and support virtual R\&D teams applicable to enterprises. Distinctive benefits of establishing virtual R&D team have been enumerated and demand future attention has been indicated in the paper
Users, Economics, Technology: Unavoidable Interdynamics
This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have overcome society ability to answer, both in economic and in human aspects. The current design paradigms, of agnostic technology development, need to be reconsidered, and the user needs to be repositioned at the center of future developments
(De)convergence in TV: a comparative analysis of the development of Smart TV
Against the backdrop of media convergence, Smart TVs are developing rapidly in large parts of the world. Smart TV refers to the integration of broadband Internet and social media features into TV sets. From a media business perspective, the proliferation of Smart TV services may put pressure on the market structure of the TV landscape, and urge for new business models in order to capture the dynamics of media convergence. By means of a comparative analysis in four European markets (Belgium, Germany, the Netherlands and the United Kingdom), the development of Smart TV is sketched in terms of viewing patterns, business models and standardization. The conclusion is that national TV markets are evolving quite differently, so that service providers must adapt their marketing strategies to reflect local market conditions. Hence, the success of Smart TV ultimately depends on the local package of value-added services and the amount of strategic partnerships with content owners, TV broadcasters and pay-TV operators
Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN
As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light
Collaborative Vehicular Edge Computing Networks: Architecture Design and Research Challenges
The emergence of augmented reality (AR), autonomous driving and other new applications have greatly enriched the functionality of the vehicular networks. However, these applications usually require complex calculations and large amounts of storage, which puts tremendous pressure on traditional vehicular networks. Mobile edge computing (MEC) is proposed as a prospective technique to extend computing and storage resources to the edge of the network. Combined with MEC, the computing and storage capabilities of the vehicular network can be further enhanced. Therefore, in this paper, we explore the novel collaborative vehicular edge computing network (CVECN) architecture. We first review the work related to MEC and vehicular networks. Then we discuss the design principles of CVECN. Based on the principles, we present the detailed CVECN architecture, and introduce the corresponding functional modules, communication process, as well as the installation and deployment ideas. Furthermore, the promising technical challenges, including collaborative coalition formation, collaborative task offloading and mobility management, are presented. And some potential research issues for future research are highlighted. Finally, simulation results are verified that the proposed CVECN can significantly improve network performance
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Summer 2010 Vol. 12 No.1
https://surface.syr.edu/ischool_news/1003/thumbnail.jp
- …