7,225 research outputs found

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    DESIGN OF EFFICIENT IN-NETWORK DATA PROCESSING AND DISSEMINATION FOR VANETS

    Get PDF
    By providing vehicle-to-vehicle and vehicle-to-infrastructure wireless communications, vehicular ad hoc networks (VANETs), also known as the “networks on wheels”, can greatly enhance traffic safety, traffic efficiency and driving experience for intelligent transportation system (ITS). However, the unique features of VANETs, such as high mobility and uneven distribution of vehicular nodes, impose critical challenges of high efficiency and reliability for the implementation of VANETs. This dissertation is motivated by the great application potentials of VANETs in the design of efficient in-network data processing and dissemination. Considering the significance of message aggregation, data dissemination and data collection, this dissertation research targets at enhancing the traffic safety and traffic efficiency, as well as developing novel commercial applications, based on VANETs, following four aspects: 1) accurate and efficient message aggregation to detect on-road safety relevant events, 2) reliable data dissemination to reliably notify remote vehicles, 3) efficient and reliable spatial data collection from vehicular sensors, and 4) novel promising applications to exploit the commercial potentials of VANETs. Specifically, to enable cooperative detection of safety relevant events on the roads, the structure-less message aggregation (SLMA) scheme is proposed to improve communication efficiency and message accuracy. The scheme of relative position based message dissemination (RPB-MD) is proposed to reliably and efficiently disseminate messages to all intended vehicles in the zone-of-relevance in varying traffic density. Due to numerous vehicular sensor data available based on VANETs, the scheme of compressive sampling based data collection (CS-DC) is proposed to efficiently collect the spatial relevance data in a large scale, especially in the dense traffic. In addition, with novel and efficient solutions proposed for the application specific issues of data dissemination and data collection, several appealing value-added applications for VANETs are developed to exploit the commercial potentials of VANETs, namely general purpose automatic survey (GPAS), VANET-based ambient ad dissemination (VAAD) and VANET based vehicle performance monitoring and analysis (VehicleView). Thus, by improving the efficiency and reliability in in-network data processing and dissemination, including message aggregation, data dissemination and data collection, together with the development of novel promising applications, this dissertation will help push VANETs further to the stage of massive deployment

    Integrating wireless technologies into intra-vehicular communication

    Full text link
    With the emergence of connected and autonomous vehicles, sensors are increasingly deployed within car. Traffic generated by these sensors congest traditional intra-vehicular networks, such as CAN buses. Furthermore, the large amount of wires needed to connect sensors makes it hard to design cars in a modular way. These limitations have created impetus to use wireless technologies to support intra-vehicular communication. In this dissertation, we tackle the challenge of designing and evaluating data collection protocols for intra-car networks that can operate reliably and efficiently under dynamic channel conditions. First, we evaluate the feasibility of deploying an intra-car wireless network based on the Backpressure Collection Protocol (BCP), which is theoretically proven to be throughput-optimal. We uncover a surprising behavior in which, under certain dynamic channel conditions, the average packet delay of BCP decreases with the traffic load. We propose and analyze a queueing-theoretic model to shed light into the observed phenomenon. As a solution, we propose a new protocol, called replication-based LIFO-backpressure (RBL). Analytical and simulation results indicate that RBL dramatically reduces the delay of BCP at low load, while maintaining its high throughput performance. Next, we propose and implement a hybrid wired/wireless architecture, in which each node is connected to either a wired interface or a wireless interface or both. We propose a new protocol, called Hybrid-Backpressure Collection Protocol (Hybrid-BCP), for the intra-car hybrid networks. Our testbed implementation, based on CAN and ZigBee transceivers, demonstrates the load balancing and routing functionalities of Hybrid-BCP and its resilience to DoS attacks. We further provide simulation results, obtained based on real intra-car RSSI traces, showing that Hybrid-BCP can achieve the same performance as a tree-based protocol while reducing the radio transmission power by a factor of 10. Finally, we present TeaCP, a prototype Toolkit for the evaluation and analysis of Collection Protocols in both simulation and experimental environments. TeaCP evaluates a wide range of standard performance metrics, such as reliability, throughput, and latency. TeaCP further allows visualization of routes and network topology evolution. Through simulation of an intra-car WSN and real lab experiments, we demonstrate the functionality of TeaCP for comparing different collection protocols

    EUROPEAN CONFERENCE ON QUEUEING THEORY 2016

    Get PDF
    International audienceThis booklet contains the proceedings of the second European Conference in Queueing Theory (ECQT) that was held from the 18th to the 20th of July 2016 at the engineering school ENSEEIHT, Toulouse, France. ECQT is a biannual event where scientists and technicians in queueing theory and related areas get together to promote research, encourage interaction and exchange ideas. The spirit of the conference is to be a queueing event organized from within Europe, but open to participants from all over the world. The technical program of the 2016 edition consisted of 112 presentations organized in 29 sessions covering all trends in queueing theory, including the development of the theory, methodology advances, computational aspects and applications. Another exciting feature of ECQT2016 was the institution of the Takács Award for outstanding PhD thesis on "Queueing Theory and its Applications"

    Optimisation of Mobile Communication Networks - OMCO NET

    Get PDF
    The mini conference “Optimisation of Mobile Communication Networks” focuses on advanced methods for search and optimisation applied to wireless communication networks. It is sponsored by Research & Enterprise Fund Southampton Solent University. The conference strives to widen knowledge on advanced search methods capable of optimisation of wireless communications networks. The aim is to provide a forum for exchange of recent knowledge, new ideas and trends in this progressive and challenging area. The conference will popularise new successful approaches on resolving hard tasks such as minimisation of transmit power, cooperative and optimal routing

    A Survey on the Network Models applied in the Industrial Network Optimization

    Full text link
    Network architecture design is very important for the optimization of industrial networks. The type of network architecture can be divided into small-scale network and large-scale network according to its scale. Graph theory is an efficient mathematical tool for network topology modeling. For small-scale networks, its structure often has regular topology. For large-scale networks, the existing research mainly focuses on the random characteristics of network nodes and edges. Recently, popular models include random networks, small-world networks and scale-free networks. Starting from the scale of network, this survey summarizes and analyzes the network modeling methods based on graph theory and the practical application in industrial scenarios. Furthermore, this survey proposes a novel network performance metric - system entropy. From the perspective of mathematical properties, the analysis of its non-negativity, monotonicity and concave-convexity is given. The advantage of system entropy is that it can cover the existing regular network, random network, small-world network and scale-free network, and has strong generality. The simulation results show that this metric can realize the comparison of various industrial networks under different models.Comment: 26 pages, 11 figures, Journa

    Analysis, simulation and testing of ITS applications based on wireless communication technologies

    Get PDF
    Intelligent Transportation Systems (ITS) aim to improve road transport safety and efficiency, to manage road networks in the interest of the society and to provide real time responses to events. In order to reach these goals, real time feedback to the drivers is expected through the integration of telecommunications, sensing and information technologies with transport engineering. Wireless communication technologies, that have been used in industrial applications for more than 30 years, play a crucial role in ITS, as based on the concept of multiple devices (on both vehicle and infrastructure side) interconnected in different ways. Connectivity, in tandem with sensing technologies, is fuelling the innovations that will inevitably lead to the next big opportunity for road transport: autonomous vehicles. Therefore, this study has investigated - through analysis, simulation and field testing – on applications based on wireless communication technologies meant to support both Data acquisition and Data diffusion as fundamental aspects/ phases in ITS, where data is widely individuated as being the key element

    Challenges of Implementing Automatic Dependent Surveillance Broadcast in the Nextgen Air Traffic Management System

    Get PDF
    The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny as the NextGen ADS-B implementation deadline draws near. The research conducted in this thesis summarizes the ADS-B security vulnerabilities that have been under recent study. Thereafter, we survey both the theoretical and practical efforts which have been conducted concerning these issues, and review possible security solutions. We create a classification of the ADS-B security solutions considered and provide a ranking of the potential solutions. Finally, we discuss the most compatible approaches available, given the constraints of the current ADS-B communications system and protocol
    • …
    corecore