5,916 research outputs found

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    On Content-centric Wireless Delivery Networks

    Full text link
    The flux of social media and the convenience of mobile connectivity has created a mobile data phenomenon that is expected to overwhelm the mobile cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the growth rate of wireless data has far exceeded the capacity increase of the mobile networks. A fundamentally new design paradigm is required to tackle the ever-growing wireless data challenge. In this article, we investigate the problem of massive content delivery over wireless networks and present a systematic view on content-centric network design and its underlying challenges. Towards this end, we first review some of the recent advancements in Information Centric Networking (ICN) which provides the basis on how media contents can be labeled, distributed, and placed across the networks. We then formulate the content delivery task into a content rate maximization problem over a share wireless channel, which, contrasting the conventional wisdom that attempts to increase the bit-rate of a unicast system, maximizes the content delivery capability with a fixed amount of wireless resources. This conceptually simple change enables us to exploit the "content diversity" and the "network diversity" by leveraging the abundant computation sources (through application-layer encoding, pushing and caching, etc.) within the existing wireless networks. A network architecture that enables wireless network crowdsourcing for content delivery is then described, followed by an exemplary campus wireless network that encompasses the above concepts.Comment: 20 pages, 7 figures,accepted by IEEE Wireless Communications,Sept.201

    Management of e-technology in China

    Get PDF
    "e" technology is bringing about many challenges for companies, in particular for their managers. This concerns a vast range of business processes in many sectors of the economy and in nearly every country of the world. In rapidly industrializing China, companies and other organizations are actively finding their way by adapting, developing and exploiting new e-technologies. The paper's focus is the identification of the management issues in implementing e-technology in China. The paper reports on research into difficulties of establishing and operating e-business in China. In particular, it discusses management related to e-technology sharing and application. A brief review of literature is followed by the analysis of three recent case studies: an international IT services alliance, a financial services provider and an international manufacturing joint venture. All case companies are applying e-technology in China, but the role of e-technology differs in the three cases: adding a service line to the existing business processes; developing a new business process; and increasing efficiency and effectiveness in business processes. The conclusions present the emerging management issues: cooperation is a key asset in networking; the choice of business models plays an important role; adequate management attention for details such as a training program is require

    Concurrent collaboration in research and development

    Get PDF
    Integration is the essence of current research and development (R&D) activity in many organizations. Integration can be established in various ways depending on the type, size and intricacy in organizational functions and products. Nevertheless, research and development (R&D) has become an inevitable function in most manufacturing companies in order to develop their own product niches for their survival in the prevailing highly completion market environment. Research and development functions are fundamental drivers of value creation in technology based enterprises. Of creating and maintaining a vibrant R&D environment, organizations individually or collectively need to incorporate virtual R&D team. A virtual R\&D team can introduce new product in less lead time than by conventional R\&D working. Therefore, how to increase the possibility of having more successful R\&D is a critical issue for enterprises. This paper examines the current approach of collaboration in R\&D issues from the perspective of their impact on virtual R\&D team in enterprises and compares the findings with the other concepts of concurrent collaboration. By reviewing literature and theories, the paper firstly presents the definition and characteristics of virtual R&D teams. A comparison of different types of virtual R&D teams along with the strengths and limitations of the preceding studies in this area are also presented. It is observed that most of the research activities encourage and support virtual R\&D teams applicable to enterprises. Distinctive benefits of establishing virtual R&D team have been enumerated and demand future attention has been indicated in the paper

    Users, Economics, Technology: Unavoidable Interdynamics

    Get PDF
    This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have overcome society ability to answer, both in economic and in human aspects. The current design paradigms, of agnostic technology development, need to be reconsidered, and the user needs to be repositioned at the center of future developments

    (De)convergence in TV: a comparative analysis of the development of Smart TV

    Get PDF
    Against the backdrop of media convergence, Smart TVs are developing rapidly in large parts of the world. Smart TV refers to the integration of broadband Internet and social media features into TV sets. From a media business perspective, the proliferation of Smart TV services may put pressure on the market structure of the TV landscape, and urge for new business models in order to capture the dynamics of media convergence. By means of a comparative analysis in four European markets (Belgium, Germany, the Netherlands and the United Kingdom), the development of Smart TV is sketched in terms of viewing patterns, business models and standardization. The conclusion is that national TV markets are evolving quite differently, so that service providers must adapt their marketing strategies to reflect local market conditions. Hence, the success of Smart TV ultimately depends on the local package of value-added services and the amount of strategic partnerships with content owners, TV broadcasters and pay-TV operators

    Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN

    Get PDF
    As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers. Both infrastructure and ad hoc network structures are supported in wireless local area networks (WLAN), which can offer high data-rate wireless multimedia services to the mobile stations (MSs) in a limited geographical area. For those out-of-coverage MSs, how to effectively connect them to the access point (AP) and provide QoS support is a challenging issue. By mixing the infrastructure and the ad hoc modes in WLAN, we propose in this paper a new coverage improvement scheme that can identify suitable idle MSs in good service zones as traffic agents (TAs) to relay traffic from those out-of-coverage MSs to the AP. The service coverage area of WLAN is then expanded. The QoS requirements (e.g., bandwidth) of those MSs are considered in the selection process of corresponding TAs. Mathematical analysis, verified by computer simulations, shows that the proposed TA scheme can effectively reduce blocking probability when traffic load is light

    Collaborative Vehicular Edge Computing Networks: Architecture Design and Research Challenges

    Get PDF
    The emergence of augmented reality (AR), autonomous driving and other new applications have greatly enriched the functionality of the vehicular networks. However, these applications usually require complex calculations and large amounts of storage, which puts tremendous pressure on traditional vehicular networks. Mobile edge computing (MEC) is proposed as a prospective technique to extend computing and storage resources to the edge of the network. Combined with MEC, the computing and storage capabilities of the vehicular network can be further enhanced. Therefore, in this paper, we explore the novel collaborative vehicular edge computing network (CVECN) architecture. We first review the work related to MEC and vehicular networks. Then we discuss the design principles of CVECN. Based on the principles, we present the detailed CVECN architecture, and introduce the corresponding functional modules, communication process, as well as the installation and deployment ideas. Furthermore, the promising technical challenges, including collaborative coalition formation, collaborative task offloading and mobility management, are presented. And some potential research issues for future research are highlighted. Finally, simulation results are verified that the proposed CVECN can significantly improve network performance

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral

    Summer 2010 Vol. 12 No.1

    Get PDF
    https://surface.syr.edu/ischool_news/1003/thumbnail.jp
    corecore