67 research outputs found

    Proximity-based systems : incorporating mobility and scalability through proximity sensing

    Get PDF
    This thesis argues that the concept of spatial proximity offers a viable and practical option for the development of context-aware systems for highly mobile and dynamic environments. Such systems would overcome the shortcomings experienced by today’s location-based and infrastructure dependent systems whose ability to deliver context-awareness is prescribed by their infrastructure. The proposed architecture will also allow for scalable interaction as against the single level of interaction in existing systems which limits services to a particular sized area. The thesis examines the concept of spatial proximity and demonstrates how this concept can be exploited to take advantage of technological convergence to offer mobility and scalability to systems. It discusses the design of a proximity-based system that can deliver scalable context-aware services in highly mobile and dynamic environments. It explores the practical application of this novel design in a proximity-sensitive messaging application by creating a proof-of-concept prototype. The proof-of-concept prototype is used to evaluate the design as well as to elicit user views and expectations about a proximity-based approach. Together these provide a valuable insight into the applicability of the proximity-based approach for designing context-aware systems. The design and development work discussed in the thesis presents a Proximity-Sensitive System Architecture that can be adapted for a variety of proximity-sensitive services. This is illustrated by means of examples, including a variety of context-aware messaging applications. The thesis also raises issues for information delivery, resource sharing, and human-computer interaction. While the technological solution (proximity-based messaging) offered is only one among several that can be developed using this architecture, it offers the opportunity to stimulate ideas in the relatively new field of proximity and technological convergence research, and contributes to a better understanding of their potential role in offering context-aware services.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Proximity-based systems : incorporating mobility and scalability through proximity sensing

    Get PDF
    This thesis argues that the concept of spatial proximity offers a viable and practical option for the development of context-aware systems for highly mobile and dynamic environments. Such systems would overcome the shortcomings experienced by today’s location-based and infrastructure dependent systems whose ability to deliver context-awareness is prescribed by their infrastructure. The proposed architecture will also allow for scalable interaction as against the single level of interaction in existing systems which limits services to a particular sized area. The thesis examines the concept of spatial proximity and demonstrates how this concept can be exploited to take advantage of technological convergence to offer mobility and scalability to systems. It discusses the design of a proximity-based system that can deliver scalable context-aware services in highly mobile and dynamic environments. It explores the practical application of this novel design in a proximity-sensitive messaging application by creating a proof-of-concept prototype. The proof-of-concept prototype is used to evaluate the design as well as to elicit user views and expectations about a proximity-based approach. Together these provide a valuable insight into the applicability of the proximity-based approach for designing context-aware systems. The design and development work discussed in the thesis presents a Proximity-Sensitive System Architecture that can be adapted for a variety of proximity-sensitive services. This is illustrated by means of examples, including a variety of context-aware messaging applications. The thesis also raises issues for information delivery, resource sharing, and human-computer interaction. While the technological solution (proximity-based messaging) offered is only one among several that can be developed using this architecture, it offers the opportunity to stimulate ideas in the relatively new field of proximity and technological convergence research, and contributes to a better understanding of their potential role in offering context-aware services.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    An aesthetics of touch: investigating the language of design relating to form

    Get PDF
    How well can designers communicate qualities of touch? This paper presents evidence that they have some capability to do so, much of which appears to have been learned, but at present make limited use of such language. Interviews with graduate designer-makers suggest that they are aware of and value the importance of touch and materiality in their work, but lack a vocabulary to fully relate to their detailed explanations of other aspects such as their intent or selection of materials. We believe that more attention should be paid to the verbal dialogue that happens in the design process, particularly as other researchers show that even making-based learning also has a strong verbal element to it. However, verbal language alone does not appear to be adequate for a comprehensive language of touch. Graduate designers-makers’ descriptive practices combined non-verbal manipulation within verbal accounts. We thus argue that haptic vocabularies do not simply describe material qualities, but rather are situated competences that physically demonstrate the presence of haptic qualities. Such competencies are more important than groups of verbal vocabularies in isolation. Design support for developing and extending haptic competences must take this wide range of considerations into account to comprehensively improve designers’ capabilities

    Design and Field Test of a Mobile Augmented Reality Human-Machine Interface for Virtual Stops in Shared Automated Mobility On-demand

    Get PDF
    Shared automated mobility on-demand (SAMOD) is considered as promising mobility solution in the future. Users book trips on-demand via smartphone and service algorithms set up virtual stops (vStop) where users then need to walk to board the automated shuttle. Navigation and identification of the virtual pick-up location, which has no references in the real world, can be challenging. Providing users with an intuitive information system in that situation is essential to achieve high user acceptance of new automated mobility services. Our novel vStop human-machine-interface (HMI) prototype for mobile augmented reality (AR) supports users with information in reference to the street environment. This work firstly presents results of an online interview study (N = 21) to conceptualize an HMI. Secondly, the HMI was prototyped with means of AR and evaluated (N = 45) regarding user experience (UX), workload and acceptance. Results show that the AR-prototype provided high rates of UX especially in terms of high pragmatic quality. Furthermore, cognitive workload when using the HMI was low and acceptance ratings were high. Results show the positive perception of AR for navigation tasks in general and the highly assistive character of the vStop prototype in particular. In the future SAMOD services could provide customers with vStop HMIs to foster user acceptance and smooth operation of their service

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Blockchain for secured IoT and D2D applications over 5G cellular networks : a thesis by publications presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer and Electronics Engineering, Massey University, Albany, New Zealand

    Get PDF
    Author's Declaration: "In accordance with Sensors, SpringerOpen, and IEEE’s copyright policy, this thesis contains the accepted and published version of each manuscript as the final version. Consequently, the content is identical to the published versions."The Internet of things (IoT) is in continuous development with ever-growing popularity. It brings significant benefits through enabling humans and the physical world to interact using various technologies from small sensors to cloud computing. IoT devices and networks are appealing targets of various cyber attacks and can be hampered by malicious intervening attackers if the IoT is not appropriately protected. However, IoT security and privacy remain a major challenge due to characteristics of the IoT, such as heterogeneity, scalability, nature of the data, and operation in open environments. Moreover, many existing cloud-based solutions for IoT security rely on central remote servers over vulnerable Internet connections. The decentralized and distributed nature of blockchain technology has attracted significant attention as a suitable solution to tackle the security and privacy concerns of the IoT and device-to-device (D2D) communication. This thesis explores the possible adoption of blockchain technology to address the security and privacy challenges of the IoT under the 5G cellular system. This thesis makes four novel contributions. First, a Multi-layer Blockchain Security (MBS) model is proposed to protect IoT networks while simplifying the implementation of blockchain technology. The concept of clustering is utilized to facilitate multi-layer architecture deployment and increase scalability. The K-unknown clusters are formed within the IoT network by applying a hybrid Evolutionary Computation Algorithm using Simulated Annealing (SA) and Genetic Algorithms (GA) to structure the overlay nodes. The open-source Hyperledger Fabric (HLF) Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The quantitative arguments demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported methods. The proposed lightweight blockchain model is also better suited to balance network latency and throughput compared to a traditional global blockchain. Next, a model is proposed to integrate IoT systems and blockchain by implementing the permissioned blockchain Hyperledger Fabric. The security of the edge computing devices is provided by employing a local authentication process. A lightweight mutual authentication and authorization solution is proposed to ensure the security of tiny IoT devices within the ecosystem. In addition, the proposed model provides traceability for the data generated by the IoT devices. The performance of the proposed model is validated with practical implementation by measuring performance metrics such as transaction throughput and latency, resource consumption, and network use. The results indicate that the proposed platform with the HLF implementation is promising for the security of resource-constrained IoT devices and is scalable for deployment in various IoT scenarios. Despite the increasing development of blockchain platforms, there is still no comprehensive method for adopting blockchain technology on IoT systems due to the blockchain's limited capability to process substantial transaction requests from a massive number of IoT devices. The Fabric comprises various components such as smart contracts, peers, endorsers, validators, committers, and Orderers. A comprehensive empirical model is proposed that measures HLF's performance and identifies potential performance bottlenecks to better meet blockchain-based IoT applications' requirements. The implementation of HLF on distributed large-scale IoT systems is proposed. The performance of the HLF is evaluated in terms of throughput, latency, network sizes, scalability, and the number of peers serviceable by the platform. The experimental results demonstrate that the proposed framework can provide a detailed and real-time performance evaluation of blockchain systems for large-scale IoT applications. The diversity and the sheer increase in the number of connected IoT devices have brought significant concerns about storing and protecting the large IoT data volume. Dependencies of the centralized server solution impose significant trust issues and make it vulnerable to security risks. A layer-based distributed data storage design and implementation of a blockchain-enabled large-scale IoT system is proposed to mitigate these challenges by using the HLF platform for distributed ledger solutions. The need for a centralized server and third-party auditor is eliminated by leveraging HLF peers who perform transaction verification and records audits in a big data system with the help of blockchain technology. The HLF blockchain facilitates storing the lightweight verification tags on the blockchain ledger. In contrast, the actual metadata is stored in the off-chain big data system to reduce the communication overheads and enhance data integrity. Finally, experiments are conducted to evaluate the performance of the proposed scheme in terms of throughput, latency, communication, and computation costs. The results indicate the feasibility of the proposed solution to retrieve and store the provenance of large-scale IoT data within the big data ecosystem using the HLF blockchain
    • …
    corecore