7,607 research outputs found

    Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

    Full text link
    Mobile (cellular) networks enable innovation, but can also stifle it and lead to user frustration when network performance falls below expectations. As mobile networks become the predominant method of Internet access, developer, research, network operator, and regulatory communities have taken an increased interest in measuring end-to-end mobile network performance to, among other goals, minimize negative impact on application responsiveness. In this survey we examine current approaches to end-to-end mobile network performance measurement, diagnosis, and application prototyping. We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public. We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does not format the URL references correctly. For a correctly formatted version of this paper go to http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd

    A Low-Cost and Energy-Effcient Wearable Device For Posture Monitoring

    Get PDF
    Millions of Americans suffer every year from back problems, now imagine if there was a way to help track and prevent back problems. Our solution to this problem is PostureBot a device that will help its users to correct their back posture and maintain good back posture.In doing so this device can help elevate and prevent people from developing minor and serious back problems in their future

    InternalBlue - Bluetooth Binary Patching and Experimentation Framework

    Full text link
    Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol optimizations imperative. Surprisingly, there is a lack of openly available tools and experimental platforms to scrutinize Bluetooth. In particular, system aspects and close to hardware protocol layers are mostly uncovered. We reverse engineer multiple Broadcom Bluetooth chipsets that are widespread in off-the-shelf devices. Thus, we offer deep insights into the internal architecture of a popular commercial family of Bluetooth controllers used in smartphones, wearables, and IoT platforms. Reverse engineered functions can then be altered with our InternalBlue Python framework---outperforming evaluation kits, which are limited to documented and vendor-defined functions. The modified Bluetooth stack remains fully functional and high-performance. Hence, it provides a portable low-cost research platform. InternalBlue is a versatile framework and we demonstrate its abilities by implementing tests and demos for known Bluetooth vulnerabilities. Moreover, we discover a novel critical security issue affecting a large selection of Broadcom chipsets that allows executing code within the attacked Bluetooth firmware. We further show how to use our framework to fix bugs in chipsets out of vendor support and how to add new security features to Bluetooth firmware

    The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey

    Get PDF
    The Internet of Things (IoT) is a dynamic global information network consisting of internet-connected objects, such as Radio-frequency identification (RFIDs), sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organisations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. More importantly, we identify the trends, opportunities and open challenges in the industry-based the IoT solutions. Based on the application domain, we classify and discuss these solutions under five different categories: smart wearable, smart home, smart, city, smart environment, and smart enterprise. This survey is intended to serve as a guideline and conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.Comment: IEEE Transactions on Emerging Topics in Computing 201

    The Design And Implementation Of The Megacomm Media Center\u27S Extranet

    Get PDF
    The Purpose of this thesis is to document the project that designed, configured and implemented a network infrastructure that provided the capability to segment, current and future, non-MegaComm Media Center companies that need IT services from the MegaComm Media Center (MMC) and provided Business-to- Business connectivity. The MegaComm Media Center, located in Littleton, Colorado, is a wholly owned subsidiary of the MegaComm Corporation. The MMC provides unique services to the cable industry. In support of these services, the MMC hosts several tenants. Prior to this project the tenants had access to internal MMC networks. The MMC also has several vendors that provide services or content for MMC programming. These vendors had unfettered access to MMC networks. This situation created concern with both the MMC network security department as well as MegaComm senior management. To mitigate the risks created by having external entities accessing MMC networks, the extranet project was commissioned. The goal of the project was to design and implement an extranet that would provide the proper functionality for both the tenant and the vendors. The project followed the System Development Life Cycle and required approximately seven months to complete. The budget for the project was $350,000.00 and required a project team of four individuals. The author was the project manager as well as the network engineer for the project. The project completed on time and within the established budget. The final deliverable was a functioning extranet that provided the necessary support for the tenants and vendors. Additionally the extranet met all of the established networking and security requirements. The final network was flexible, expandable and extensible due to its modular design. The project was extremely successful

    Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.

    Get PDF
    This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD). The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area
    • …
    corecore