7,607 research outputs found
Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services
Mobile (cellular) networks enable innovation, but can also stifle it and lead
to user frustration when network performance falls below expectations. As
mobile networks become the predominant method of Internet access, developer,
research, network operator, and regulatory communities have taken an increased
interest in measuring end-to-end mobile network performance to, among other
goals, minimize negative impact on application responsiveness. In this survey
we examine current approaches to end-to-end mobile network performance
measurement, diagnosis, and application prototyping. We compare available tools
and their shortcomings with respect to the needs of researchers, developers,
regulators, and the public. We intend for this survey to provide a
comprehensive view of currently active efforts and some auspicious directions
for future work in mobile network measurement and mobile application
performance evaluation.Comment: Submitted to IEEE Communications Surveys and Tutorials. arXiv does
not format the URL references correctly. For a correctly formatted version of
this paper go to
http://www.cs.montana.edu/mwittie/publications/Goel14Survey.pd
A Low-Cost and Energy-Effcient Wearable Device For Posture Monitoring
Millions of Americans suffer every year from back problems, now imagine if there was a way to help track and prevent back problems. Our solution to this problem is PostureBot a device that will help its users to correct their back posture and maintain good back posture.In doing so this device can help elevate and prevent people from developing minor and serious back problems in their future
InternalBlue - Bluetooth Binary Patching and Experimentation Framework
Bluetooth is one of the most established technologies for short range digital
wireless data transmission. With the advent of wearables and the Internet of
Things (IoT), Bluetooth has again gained importance, which makes security
research and protocol optimizations imperative. Surprisingly, there is a lack
of openly available tools and experimental platforms to scrutinize Bluetooth.
In particular, system aspects and close to hardware protocol layers are mostly
uncovered.
We reverse engineer multiple Broadcom Bluetooth chipsets that are widespread
in off-the-shelf devices. Thus, we offer deep insights into the internal
architecture of a popular commercial family of Bluetooth controllers used in
smartphones, wearables, and IoT platforms. Reverse engineered functions can
then be altered with our InternalBlue Python framework---outperforming
evaluation kits, which are limited to documented and vendor-defined functions.
The modified Bluetooth stack remains fully functional and high-performance.
Hence, it provides a portable low-cost research platform.
InternalBlue is a versatile framework and we demonstrate its abilities by
implementing tests and demos for known Bluetooth vulnerabilities. Moreover, we
discover a novel critical security issue affecting a large selection of
Broadcom chipsets that allows executing code within the attacked Bluetooth
firmware. We further show how to use our framework to fix bugs in chipsets out
of vendor support and how to add new security features to Bluetooth firmware
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey
The Internet of Things (IoT) is a dynamic global information network
consisting of internet-connected objects, such as Radio-frequency
identification (RFIDs), sensors, actuators, as well as other instruments and
smart appliances that are becoming an integral component of the future
internet. Over the last decade, we have seen a large number of the IoT
solutions developed by start-ups, small and medium enterprises, large
corporations, academic research institutes (such as universities), and private
and public research organisations making their way into the market. In this
paper, we survey over one hundred IoT smart solutions in the marketplace and
examine them closely in order to identify the technologies used,
functionalities, and applications. More importantly, we identify the trends,
opportunities and open challenges in the industry-based the IoT solutions.
Based on the application domain, we classify and discuss these solutions under
five different categories: smart wearable, smart home, smart, city, smart
environment, and smart enterprise. This survey is intended to serve as a
guideline and conceptual framework for future research in the IoT and to
motivate and inspire further developments. It also provides a systematic
exploration of existing research and suggests a number of potentially
significant research directions.Comment: IEEE Transactions on Emerging Topics in Computing 201
Recommended from our members
Don't mind the gap: Bridging network-wide objectives and device-level configurations
We reflect on the historical context that lead to Propane, a high-level language and compiler to help network operators bridge the gap between network-wide routing objectives and low-level configurations of devices that run complex, distributed protocols. We also highlight the primary contributions that Propane made to the networking literature and describe ongoing challenges. We conclude with an important lesson learned from the experience
The Design And Implementation Of The Megacomm Media Center\u27S Extranet
The Purpose of this thesis is to document the project that designed, configured and implemented a network infrastructure that provided the capability to segment, current and future, non-MegaComm Media Center companies that need IT services from the MegaComm Media Center (MMC) and provided Business-to- Business connectivity. The MegaComm Media Center, located in Littleton, Colorado, is a wholly owned subsidiary of the MegaComm Corporation. The MMC provides unique services to the cable industry. In support of these services, the MMC hosts several tenants. Prior to this project the tenants had access to internal MMC networks. The MMC also has several vendors that provide services or content for MMC programming. These vendors had unfettered access to MMC networks. This situation created concern with both the MMC network security department as well as MegaComm senior management. To mitigate the risks created by having external entities accessing MMC networks, the extranet project was commissioned. The goal of the project was to design and implement an extranet that would provide the proper functionality for both the tenant and the vendors. The project followed the System Development Life Cycle and required approximately seven months to complete. The budget for the project was $350,000.00 and required a project team of four individuals. The author was the project manager as well as the network engineer for the project. The project completed on time and within the established budget. The final deliverable was a functioning extranet that provided the necessary support for the tenants and vendors. Additionally the extranet met all of the established networking and security requirements. The final network was flexible, expandable and extensible due to its modular design. The project was extremely successful
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD).
The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area
- …