1,982 research outputs found

    Mobile ad hoc networks for intelligent systems

    Get PDF
    Advances in wireless technology and portable computing along with demands for high user mobility have provided a major promotion toward the development of ad hoc networks. Mobile ad hoc networks feature dynamic topology, self-organization, limited bandwidth and battery power of a node. They do not rely on specialized routers for path discovery and traffic routing. Research on ad hoc networks has been extensively investigated in the past few years and related work has focused on many of the layers of the communications architecture. This research intends to investigate applications of MANET for intelligent systems, including intelligent transportation system (ITS), sensor network and mobile intelligent robot network, and propose some approaches to topology management, link layer multiple access and routing algorithms. Their performance is evaluated by theoretical analysis and off-the-shelf simulation tools. Most current research on ad hoc networks assumes the availability of IEEE 802.11. However, the RTS/CTS protocol of 802.11 still leads to packet collision which in turn decreases the network throughput and lifetime. For sensor networks, sensors are mostly battery operated. Hence, resolving packet collision may improve network lifetime by saving valuable power. Using space and network diversity combination, this work proposes a new packet separation approach to packet collision caused by masked nodes. Inter-vehicle communication is a key component of ITS and it is also called vehicular ad hoc network. VANET has many features different from regular MANETs in terms of mobility, network size and connectivity. Given rapid topology changes and network partitioning, this work studies how to organize the numerous vehicular nodes and establish message paths between any pair of vehicular nodes if they are not apart too far away. In urban areas, the inter-vehicle communication has different requirements and constraints than highway environments. The proposed position-based routing strategy for VANETs utilizes the traffic pattern in city environments. Packets are forwarded based on traffic lights timing sequence and the moving direction of relaying vehicles. A multicast protocol is also introduced to visualize the real time road traffic with customized scale. Only vehicles related to a source node\u27s planned trajectory will reply the query packet. The visualized real time traffic information therefore helps the driver make better decision in route planning when traffic congestion happens. Nowadays robots become more and more powerful and intelligent. They can take part in operations in a cooperative manner which makes distributed control necessary. Ad hoc robot communication network is still fresh field for researchers working on networking technology. This work investigates some key issues in robot ad hoc network and evaluate the challenges while establishing robot ad hoc networks

    Exploring enclosed environments with floating sensors:mapping using ultrasound

    Get PDF

    Exploring enclosed environments with floating sensors:mapping using ultrasound

    Get PDF

    Cryptography for Bitcoin and friends

    Get PDF
    Numerous cryptographic extensions to Bitcoin have been proposed since Satoshi Nakamoto introduced the revolutionary design in 2008. However, only few proposals have been adopted in Bitcoin and other prevalent cryptocurrencies, whose resistance to fundamental changes has proven to grow with their success. In this dissertation, we introduce four cryptographic techniques that advance the functionality and privacy provided by Bitcoin and similar cryptocurrencies without requiring fundamental changes in their design: First, we realize smart contracts that disincentivize parties in distributed systems from making contradicting statements by penalizing such behavior by the loss of funds in a cryptocurrency. Second, we propose CoinShuffle++, a coin mixing protocol which improves the anonymity of cryptocurrency users by combining their transactions and thereby making it harder for observers to trace those transactions. The core of CoinShuffle++ is DiceMix, a novel and efficient protocol for broadcasting messages anonymously without the help of any trusted third-party anonymity proxies and in the presence of malicious participants. Third, we combine coin mixing with the existing idea to hide payment values in homomorphic commitments to obtain the ValueShuffle protocol, which enables us to overcome major obstacles to the practical deployment of coin mixing protocols. Fourth, we show how to prepare the aforementioned homomorphic commitments for a safe transition to post-quantum cryptography.Seit seiner revolutionären Erfindung durch Satoshi Nakamoto im Jahr 2008 wurden zahlreiche kryptographische Erweiterungen für Bitcoin vorgeschlagen. Gleichwohl wurden nur wenige Vorschläge in Bitcoin und andere weit verbreitete Kryptowährungen integriert, deren Resistenz gegen tiefgreifende Veränderungen augenscheinlich mit ihrer Verbreitung wächst. In dieser Dissertation schlagen wir vier kryptographische Verfahren vor, die die Funktionalität und die Datenschutzeigenschaften von Bitcoin und ähnlichen Kryptowährungen verbessern ohne deren Funktionsweise tiefgreifend verändern zu müssen. Erstens realisieren wir Smart Contracts, die es erlauben widersprüchliche Aussagen einer Vertragspartei mit dem Verlust von Kryptogeld zu bestrafen. Zweitens schlagen wir CoinShuffle++ vor, ein Mix-Protokoll, das die Anonymität von Benutzern verbessert, indem es ihre Transaktionen kombiniert und so deren Rückverfolgung erschwert. Sein Herzstück ist DiceMix, ein neues und effizientes Protokoll zur anonymen Veröffentlichung von Nachrichten ohne vertrauenswürdige Dritte und in der Präsenz von bösartigen Teilnehmern. Drittens kombinieren wir dieses Protokoll mit der existierenden Idee, Geldbeträge in Commitments zu verbergen, und erhalten so das ValueShuffle-Protokoll, das uns ermöglicht, große Hindernisse für den praktischen Einsatz von Mix-Protokollen zu überwinden. Viertens zeigen wir, wie die dabei benutzten Commitments für einen sicheren Übergang zu Post-Quanten-Kryptographie vorbereitet werden können

    Cross-layer design for wireless sensor relay networks

    Get PDF
    In recent years, the idea of wireless sensor networks has gathered a great deal of attention. A distributed wireless sensor network may have hundreds of small sensor nodes. Each individual sensor contains both processing and communication elements and is designed in some degree to monitor the environmental events specified by the end user of the network. Information about the environment is gathered by sensors and delivered to a remote collector. This research conducts an investigation with respect to the energy efficiency and the cross-layer design in wireless sensor networks. Motivated by the multipath utilization and transmit diversity capability of space-time block codes (STBC), a new energy efficient cooperative routing algorithm using the STBC is proposed. Furthermore, the steady state performance of the network is analyzed via a Markov chain model. The proposed approach in this dissertation can significantly reduce the energy consumption and improve the power efficiency. This work also studies the application of differential STBC for wireless multi-hop sensor networks over fading channels. Using differential STBC, multiple sensors are selected acting as parallel relay nodes to receive and relay collected data. The proposed technique offers low complexity, since it does not need to track or estimate the time-varying channel coefficients. Analysis and simulation results show that the new approach can improve the system performance. This dissertation models the cooperative relay method for sensor networks using a Markov chain and an M/G/1 queuing system. The analytical and simulation results indicate system improvements in terms of throughput and end-to-end delay. Moreover, the impact of network resource constraints on the performance of multi-hop sensor networks with cooperative relay is also investigated. The system performance under assumptions of infinite buffer or finite buffer sizes is studied, the go through delay and the packet drop probability are improved compared to traditional single relay method. Moreover, a packet collision model for crucial nodes in wireless sensor networks is introduced. Using such a model, a space and network diversity combining (SNDC) method is designed to separate the collision at the collector. The network performance in terms of throughput, delay, energy consumption and efficiency are analyzed and evaluated

    Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC

    Get PDF
    AbstractCarrier Sense Multiple Access/Collision Detection (CSMA/CD) is the protocol for carrier transmission access in Ethernet networks (international standard IEEE 802.3). On Ethernet, any Network Interface Card (NIC) can try to send a packet in a channel at any time. If another NIC tries to send a packet at the same time, a collision is said to occur and the packets are discarded. The CSMA/CD protocol was designed to avoid this problem, more precisely to allow a NIC to send its packet without collision. This is done by way of a randomized exponential backoff process. In this paper, we analyse the correctness of the CSMA/CD protocol, using techniques from probabilistic model checking and approximate probabilistic model checking. The tools that we use are PRISM and APMC. Moreover, we provide a quantitative analysis of some CSMA/CD properties

    Virtual Reality Games for Motor Rehabilitation

    Get PDF
    This paper presents a fuzzy logic based method to track user satisfaction without the need for devices to monitor users physiological conditions. User satisfaction is the key to any product’s acceptance; computer applications and video games provide a unique opportunity to provide a tailored environment for each user to better suit their needs. We have implemented a non-adaptive fuzzy logic model of emotion, based on the emotional component of the Fuzzy Logic Adaptive Model of Emotion (FLAME) proposed by El-Nasr, to estimate player emotion in UnrealTournament 2004. In this paper we describe the implementation of this system and present the results of one of several play tests. Our research contradicts the current literature that suggests physiological measurements are needed. We show that it is possible to use a software only method to estimate user emotion

    Distributed opportunistic scheduling algorithms for wireless communications.

    Get PDF
    In this thesis, we propose a number of distributed schemes for wireless communications in the cross layer design context, considering an uplink random access network in which multiple users communicate with a common base station. In addition, we perform a comprehensive study on a splitting based multiuser selection algorithm which is simple, effective, and scales with the network size. First, we investigate a reservation-type protocol in a channel aware ALOHA system. Various Markovian models are used to describe the system and to capture the temporal correlation of the channel evolution. The average throughput of the system is obtained using the Markov Analysis technique and we show that the reservation protocol can achieve better performance than the original channel-aware ALOHA by reducing the collision probability. Second, for better resource utilization in the Opportunistic Multichannel ALOHA scheme, we propose a simple extension to the transmission policy that exploits the idle channels. Performance analysis shows that, theoretically, the maximum system throughput can be improved by up to 63% in the asymptotic case. Through numerical results, it can be seen that a significant gain is achieved even when the system consists of a small number of users. Third, we consider a splitting based multiuser selection algorithm in a probabilistic view. Asymptotic analysis leads to a functional equation, similar to that encountered in the analysis of the collision resolution algorithm. Subject to some conditions, the solution of the functional equation can be obtained, which provides the approximations for the expected number of slots and the expected number of transmissions required by the algorithm in a large system. These results shed light on open design problems in choosing parameters for the algorithm when considering the delay and the overhead jointly. A typical example is to optimize the parameters that minimize the weighted sum of these measures of interest

    Security Threats Classification in Blockchains

    Get PDF
    Blockchain, the foundation of Bitcoin, has become one of the most popular technologies to create and manage digital transactions recently. It serves as an immutable ledger which allows transactions take place in a decentralized manner. This expeditiously evolving technology has the potential to lead to a shift in thinking about digital transactions in multiple sectors including, Internet of Things, healthcare, energy, supply chain, manufacturing, cybersecurity and principally financial services. However, this emerging technology is still in its infancy. Despite the huge opportunities blockchain offers, it suffers from challenges and limitation such as scalability, security, and privacy, compliance, and governance issues that have not yet been thoroughly explored and addressed. Although there are some studies on the security and privacy issues of the blockchain, they lack a systematic examination of the security of blockchain systems. This research conducted a systematic survey of the security threats to the blockchain systems and reviewed the existing vulnerabilities in the Blockchain. These vulnerabilities lead to the execution of the various security threats to the normal functionality of the Blockchain platforms. Moreover, the study provides a case-study for each attack by examining the popular blockchain systems and also reviews possible countermeasures which could be used in the development of various blockchain systems. Furthermore, this study developed taxonomies that classified the security threats and attacks based on the blockchain abstract layers, blockchain primary processes and primary business users. This would assist the developers and businesses to be attentive to the existing threats in different areas of the blockchain-based platforms and plan accordingly to mitigate risk. Finally, summarized the critical open challenges, and suggest future research directions

    Robots learn to behave: improving human-robot collaboration in flexible manufacturing applications

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen
    • …
    corecore