83,589 research outputs found
Network layer access control for context-aware IPv6 applications
As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Flat Cellular (UMTS) Networks
Traditionally, cellular systems have been built in a hierarchical manner: many specialized cellular access network elements that collectively form a hierarchical cellular system. When 2G and later 3G systems were designed there was a good reason to make system hierarchical: from a cost-perspective it was better to concentrate traffic and to share the cost of processing equipment over a large set of users while keeping the base stations relatively cheap. However, we believe the economic reasons for designing cellular systems in a hierarchical manner have disappeared: in fact, hierarchical architectures hinder future efficient deployments. In this paper, we argue for completely flat cellular wireless systems, which need just one type of specialized network element to provide radio access network (RAN) functionality, supplemented by standard IP-based network elements to form a cellular network. While the reason for building a cellular system in a hierarchical fashion has disappeared, there are other good reasons to make the system architecture flat: (1) as wireless transmission techniques evolve into hybrid ARQ systems, there is less need for a hierarchical cellular system to support spatial diversity; (2) we foresee that future cellular networks are part of the Internet, while hierarchical systems typically use interfaces between network elements that are specific to cellular standards or proprietary. At best such systems use IP as a transport medium, not as a core component; (3) a flat cellular system can be self scaling while a hierarchical system has inherent scaling issues; (4) moving all access technologies to the edge of the network enables ease of converging access technologies into a common packet core; and (5) using an IP common core makes the cellular network part of the Internet
Recommended from our members
Privacy In The Smart Grid: An Information Flow Analysis
Project Final Report prepared for CIEE and California Energy Commissio
Mechanical design and development of TES bolometer detector arrays for the Advanced ACTPol experiment
The next generation Advanced ACTPol (AdvACT) experiment is currently underway
and will consist of four Transition Edge Sensor (TES) bolometer arrays, with
three operating together, totaling ~5800 detectors on the sky. Building on
experience gained with the ACTPol detector arrays, AdvACT will utilize various
new technologies, including 150mm detector wafers equipped with multichroic
pixels, allowing for a more densely packed focal plane. Each set of detectors
includes a feedhorn array of stacked silicon wafers which form a spline profile
leading to each pixel. This is then followed by a waveguide interface plate,
detector wafer, back short cavity plate, and backshort cap. Each array is
housed in a custom designed structure manufactured from high purity copper and
then gold plated. In addition to the detector array assembly, the array package
also encloses cryogenic readout electronics. We present the full mechanical
design of the AdvACT high frequency (HF) detector array package along with a
detailed look at the detector array stack assemblies. This experiment will also
make use of extensive hardware and software previously developed for ACT, which
will be modified to incorporate the new AdvACT instruments. Therefore, we
discuss the integration of all AdvACT arrays with pre-existing ACTPol
infrastructure.Comment: 9 pages, 5 figures, SPIE Astronomical Telescopes and Instrumentation
conference proceeding
- …