72 research outputs found

    Mobile IP: state of the art report

    Get PDF
    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group, that is able to inform the network about this change in network attachment such that the Internet data packets will be delivered in a seamless way to the new point of attachment. This document presents current developments and research activities in the Mobile IP area

    Mobile IP: state of the art report

    Get PDF

    Infraestrutura de beira de estrada para apoio a sistemas cooperativos e inteligentes de transportes

    Get PDF
    The growing need of mobility along with the evolution of the automotive industry and the massification of the personal vehicle amplifies some of the road-related problems such as safety and traffic congestion. To mitigate such issues, the evolution towards cooperative communicating technologies and autonomous systems is considered a solution to overcome the human physical limitations and the limited perception horizon of on-board sensors. Short-range vehicular communications such as Vehicle-to-Vehicle or Vehicle-to-Infrastructure (ETSI ITS-G5) in conjunction with long-range cellular communications (LTE,5G) and standardized messages, emerge as viable solutions to amplify the benefits that standalone technologies can bring to the road environment, by covering a wide array of applications and use cases. In compliance with the standardization work from European Telecommunications Standards Institute (ETSI), this dissertation describes the implementation of the collective perception service in a real road infrastructure to assist the maneuvers of autonomous vehicles and provide information to a central road operator. This work is focused on building standardized collective perception messages (CPM) by retrieving information from traffic classification radars (installed in the PASMO project) for local dissemination using ETSI ITS-G5 radio technology and creating a redundant communication channel between the road infrastructure and a central traffic control centre, located at the Instituto de Telecomunicações - Aveiro, taking advantage of cellular, point-to-point radio links and optical fiber communications. The output of the messages are shown to the user by a mobile application. The service is further improved by building an algorithm for optimizing the message dissemination to improve channel efficiency in more demanding scenarios. The results of the experimental tests showed that the time delay between the production event of the collective perception message and the reception by other ITS stations is within the boundaries defined by ETSI standards. Moreover, the algorithm for message dissemination also shows to increase radio channel efficiency by limiting the number of objects disseminated by CPM messages. The collective perception service developed and the road infrastructure are therefore, a valuable asset to provide useful information for improving road safety and fostering the deployment of intelligent cooperative transportation systems.A crescente necessidade de mobilidade em paralelo com a evolução da indústria automóvel e com a massificação do uso de meios de transportes pessoais, têm vindo a amplificar alguns problemas dos transportes rodoviários, tais como a segurança e o congestionamento do tráfego. Para mitigar estas questões, a evolução das tecnologias de comunicação cooperativas e dos sistemas autónomos é vista como uma potencial solução para ultrapassar limitações dos condutores e do horizonte de perceção dos sensores veículares. Comunicações de curto alcance, tais como Veículo-a-Veículo ou Veículo-a-Infrastrutura (ETSI ITS-G5), em conjunto com comunicações móveis de longo alcance (LTE,5G) e mensagens padrão, emergem como soluções viáveis para amplificar todos os beneficios que tecnologias independentes podem trazer para o ambiente rodoviário, cobrindo um grande leque de aplicações e casos de uso da estrada. Em conformidade com o trabalho de padronização da European Telecommunications Standards Institute, esta dissertação descreve a implementação do serviço de perceção coletiva, numa infrastrutura rodoviária real, para suporte a manobras de veículos autónomos e para fornecer informações aos operadores de estradas. Este trabalho foca-se na construção de mensagens de perceção coletiva a partir de informação gerada por radares de classificação de tráfego (instalados no âmbito do projeto PASMO) para disseminação local usando a tecnologia rádio ETSI ITS-G5 e criando um canal de comunicação redundante entre a infraestrutura rodóviaria e um centro de controlo de tráfego localizado no Instituto de Telecomunicações - Aveiro, usando para isso: redes móveis, ligações rádio ponto a ponto e fibra ótica. O conteúdo destas messagens é mostrado ao utilizador através de uma aplicação móvel. O serviço é ainda melhorado, tendo-se para tal desenvolvido um algoritmo de otimização de disseminação das mensagens, tendo em vista melhorar a eficiência do canal de transmissão em cenários mais exigentes. Os resultados dos testes experimentais efetuados revelaram que o tempo de atraso entre o evento de produção de uma mensagem de perceção coletiva e a receção por outra estação ITS, usando comunicações ITS-G5, se encontra dentro dos limites definidos pelos padrões da ETSI. Além disso, o algoritmo para disseminação de mensagens também mostrou aumentar a eficiência do canal de rádio, limitando o número de objetos disseminados pelas mesmas. Assim, o serviço de perceção coletiva desenvolvido poderá ser uma ferramenta valiosa, contribuindo para o aumento da segurança rodóviaria e para a disseminação da utilização dos sistemas cooperativos de transporte inteligente.Mestrado em Engenharia Eletrónica e Telecomunicaçõe

    A holistic review of cybersecurity and reliability perspectives in smart airports

    Get PDF
    Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time monitoring and analytics. Smart sensors control the environmental conditions inside the airport, automate passenger-related actions and support airport security. However, these augmentations and automation introduce security threats to network systems of smart airports. Cyber-attackers demonstrated the susceptibility of IoT systems and networks to Advanced Persistent Threats (APT), due to hardware constraints, software flaws or IoT misconfigurations. With the increasing complexity of attacks, it is imperative to safeguard IoT networks of smart airports and ensure reliability of services, as cyber-attacks can have tremendous consequences such as disrupting networks, cancelling travel, or stealing sensitive information. There is a need to adopt and develop new Artificial Intelligence (AI)-enabled cyber-defence techniques for smart airports, which will address the challenges brought about by the incorporation of IoT systems to the airport business processes, and the constantly evolving nature of contemporary cyber-attacks. In this study, we present a holistic review of existing smart airport applications and services enabled by IoT sensors and systems. Additionally, we investigate several types of cyber defence tools including AI and data mining techniques, and analyse their strengths and weaknesses in the context of smart airports. Furthermore, we provide a classification of smart airport sub-systems based on their purpose and criticality and address cyber threats that can affect the security of smart airport\u27s networks

    A holistic review of cybersecurity and reliability perspectives in smart airports

    Get PDF
    Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time monitoring and analytics. Smart sensors control the environmental conditions inside the airport, automate passenger-related actions and support airport security. However, these augmentations and automation introduce security threats to network systems of smart airports. Cyber-attackers demonstrated the susceptibility of IoT systems and networks to Advanced Persistent Threats (APT), due to hardware constraints, software flaws or IoT misconfigurations. With the increasing complexity of attacks, it is imperative to safeguard IoT networks of smart airports and ensure reliability of services, as cyber-attacks can have tremendous consequences such as disrupting networks, cancelling travel, or stealing sensitive information. There is a need to adopt and develop new Artificial Intelligence (AI)-enabled cyber-defence techniques for smart airports, which will address the challenges brought about by the incorporation of IoT systems to the airport business processes, and the constantly evolving nature of contemporary cyber-attacks. In this study, we present a holistic review of existing smart airport applications and services enabled by IoT sensors and systems. Additionally, we investigate several types of cyber defence tools including AI and data mining techniques, and analyse their strengths and weaknesses in the context of smart airports. Furthermore, we provide a classification of smart airport sub-systems based on their purpose and criticality and address cyber threats that can affect the security of smart airport\u27s networks

    A holistic review of cybersecurity and reliability perspectives in smart airports

    Get PDF
    Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time monitoring and analytics. Smart sensors control the environmental conditions inside the airport, automate passenger-related actions and support airport security. However, these augmentations and automation introduce security threats to network systems of smart airports. Cyber-attackers demonstrated the susceptibility of IoT systems and networks to Advanced Persistent Threats (APT), due to hardware constraints, software flaws or IoT misconfigurations. With the increasing complexity of attacks, it is imperative to safeguard IoT networks of smart airports and ensure reliability of services, as cyber-attacks can have tremendous consequences such as disrupting networks, cancelling travel, or stealing sensitive information. There is a need to adopt and develop new Artificial Intelligence (AI)-enabled cyber-defence techniques for smart airports, which will address the challenges brought about by the incorporation of IoT systems to the airport business processes, and the constantly evolving nature of contemporary cyber-attacks. In this study, we present a holistic review of existing smart airport applications and services enabled by IoT sensors and systems. Additionally, we investigate several types of cyber defence tools including AI and data mining techniques, and analyse their strengths and weaknesses in the context of smart airports. Furthermore, we provide a classification of smart airport sub-systems based on their purpose and criticality and address cyber threats that can affect the security of smart airport\u27s networks

    Naval Reserve support to information Operations Warfighting

    Get PDF
    Since the mid-1990s, the Fleet Information Warfare Center (FIWC) has led the Navy's Information Operations (IO) support to the Fleet. Within the FIWC manning structure, there are in total 36 officer and 84 enlisted Naval Reserve billets that are manned to approximately 75 percent and located in Norfolk and San Diego Naval Reserve Centers. These Naval Reserve Force personnel could provide support to FIWC far and above what they are now contributing specifically in the areas of Computer Network Operations, Psychological Operations, Military Deception and Civil Affairs. Historically personnel conducting IO were primarily reservists and civilians in uniform with regular military officers being by far the minority. The Naval Reserve Force has the personnel to provide skilled IO operators but the lack of an effective manning document and training plans is hindering their opportunity to enhance FIWC's capabilities in lull spectrum IO. This research investigates the skill requirements of personnel in IO to verify that the Naval Reserve Force has the talent base for IO support and the feasibility of their expanded use in IO.http://archive.org/details/navalreservesupp109451098

    Modules for machine-to-machine communication i GPRS : case study, medical surveillance

    Get PDF
    Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, GrimstadMachine-to-machine communication is estimated to get an exponential growth in the coming years. This will open for new ways to utilise the networks, and is foreseen to be a means to increase business. Increased efficiency and service level can be assumed, and new business opportunities are predicted, in a scenario made possible as creative people notice a technology constantly providing cheaper and smaller devices, the bandwidth increases and the charging fee per bit decreases. GSM offers ubiquitous coverage and a wide selection of bearer services, and several methods for positioning can be used. The alternative bearers are discussed and evaluated. The different types of machine-to-machine applications have a vast difference in requirements, and cannot be foreseen solved by one type of module within a short time frame. To realise this diversity, proper classification is proposed. The continuous technology development improves vital factors like size power demand and cost. This will open for new applications. It is expected that it will be soon be possible to have a complete module on a single chip. This is a strong argument for not suggesting any major change to GSM module architecture. To illustrate the possibilities in the machine-to-machine scenario, a concept is outlined and discussed. The chosen concept is within medical surveillance. This application is considered to have a large potential, and significant costs in terms of both hospital beds and medical personnel can be saved. The application contains most module aspects. Opportunities are foreseen by the proposed concept. As the M2M market gets more mature, the current players realise that the margins get smaller. A value chain can be identified, and the different roles in the value chain must be admitted and accepted in order to succeed in the development of M2M applications. In a mature market, each party must focus on dedicated roles in order to get or maintain a leading role. Alliances are considered to be a good solution to offer competitive solutions, and additional value added services may further increase revenues

    Community planning in the network society

    Get PDF
    Models of social change have yet to emerge that deal with planning for change at the local community level due to the growth of public network, the Internet. The interactive network is changing the way people live, the way people earn a living, and perhaps more importantly, the way people spend their leisure time. The understanding of the impacts such technological diffusion plays in sustaining the social capital of the smaller communities of America will be of importance to developers of public networks and planners of the local and regional communities. This thesis discusses major trends that will shape the future of social participation in smaller American communities. The thesis will lead a discussion of the history of technological diffusion in society and will focus on the acceptance of advanced means of communication and information processing within various forms of social groups. After such discussion, a proposed Human/Network Interface (HuNI) model will provide a structure for the evolving roles of social groups with regard to the increasing pervasiveness of advanced network communications. Using the HuNI model as a framework, the thesis will conclude with a discussion of practical implications for planners concerning the influence the Internet will have on smaller communities
    • …
    corecore