853 research outputs found

    Scalable Data Management in Mobile Environments: protocol design in MANETs and data management in mobile sensors

    Get PDF
    My presentation addressed with two areas of my current research interests: (1) Protocol design in Mobile Ad-hoc Networks, and (2) Sensor data management. It describes briefly the motivating challenges and our approach to dealing with them

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Strategic Planning in the College and University Ecosystem Outlook 2012: Chickens or Eggs? lT Trends on Campus: 2012 Best Practices in Deploying a Successful University SAN Beyond Convergence: How Advanced Networking Will Erase Campus Boundaries Distributed Computing: The Path to the Power? Cell Phones on the University Campus: Adversary or Ally? lnstitutional Excellence Award Honorable Mention: Wake Forest University Interview President\u27s Message From the Executive Director Here\u27s My Advic

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Virtual Cell Layout Based Dynamic Source Routing (vb-dsr) For The Mobile Subsystem Of The Next Generation Tactical Communications Systems

    Get PDF
    Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2002Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2002Telsiz ağlar, 1970’lerde ortaya çıkışlarından itibaren bilgisayar endüstrisinde çok yaygınlaşmıştır. Telsiz ağlar gezgin kullanıcılara nerede olduklarına bağlı olmadan heryerde iletişim kurma ve bilgiye erişim imkanı sağlar. Hiçbir sabit altyapıya gerek duymadan bu imkanı sağlayan ad hoc ağların zaman içinde gelişmesiyle ve askeri, ticari ve özel maksatlar için tercih edilir hale gelmesiyle, uygulamada bazı zorluklar başgöstermiştir. Çalışmamızda, bu zorlukları ve ad hoc ağlardan beklenenleri dikkate alarak Sanal Hücre Kalıbı (SHK) tabanlı Dinamik Kaynak Yol Atama (DKYA) yaklaşımını bir çözüm olarak sunuyoruz. SHK, etkili bir özkaynak yönetimi ve ağ ölçeklenebilirliği sağlayan çok-katmanlı öbek-yapılı bir yaklaşımdır. Biz SHK yapısının üzerine Dinamik Kaynak Yolatama protokolunu uyguladık. Sunduğumuz yaklaşım, SHK yapılı DKYA, iki düzeyli hiyerarşik öbek yapılı bir sistemdir. SHK yaklaşımında önerilen benzetim yaklaşımını geliştiriyoruz ve taktik iletişimlerin başarımlarının değerlendirmesinde bu benzetim yaklaşımını kullanıyoruz. Bu yöntemde, önceden gerçekleştirilen bilgisayar destekli askeri tatbikatlarda girilen emirleri, çok sayıdaki birliğe ait hareket, görev ve durum gibi verileri toplayan bir yapıcı (muharebe) model kullanarak tekrar işlemekteyiz. Daha sonra toplanan bu veriler daha da detaylandırılarak, başarı ölçütlerimize ait değerleri üreten benzetim kullanılmaktadır. Sistemi değerlendiren başarım ölçütleri, SHK-tabanlı DKYA’nın gezgin ad hoc ağlardan beklenenleri sağladığını göstermektedir.Wireless networks have become very popular in the computing industry after their emergence in the 1970’s. Wireless networks provide mobile user with ubiquitous communication capability and information access regardless of location. Mobile ad hoc networks, that manage it without a need to infrastructure networks, as evolved in time, exhibit some challenges to implement as they become more preferable for military, commercial and special purposes. By considering the challenges and expectations of mobile ad hoc networks, we propose an approach called VCL based DSR (VB-DSR), which uses Dynamic Source Routing (DSR) protocol over Virtual Cell Layout (VCL) structure. VCL is a multi-tier cluster-based approach that provides an efficient resource management and network scalability. We implemented Dynamic Source Routing protocol over VCL structure. Proposed approach, VB-DSR, is a cluster-based two level hierarchical scheme. We also enhance the simulation approach proposed by VCL structure, and use it for the evaluation of tactical communication systems. In this approach, the commands entered during the military computer aided exercises are replayed by running a constructive (combat) model which generates mobility, posture and status data for a number of units, then these data are enhanced and drive a simulation which produces the data related to the performance metrics. The evaluated performance of the system shows that VB-DSR approach satisfies the requirements of mobile ad hoc networks.Yüksek LisansM.Sc

    Stability of secure routing protocol in ad hoc wireless network.

    Get PDF
    The contributions of this research are threefold. First, it offers a new routing approach to ad hoc wireless network protocols: the Enhanced Heading-direction Angle Routing Protocol (EHARP), which is an enhancement of HARP based on an on-demand routing scheme. We have added important features to overcome its disadvantages and improve its performance, providing the stability and availability required to guarantee the selection of the best path. Each node in the network is able to classify its neighbouring nodes according to their heading directions into four different zone-direction group. The second contribution is to present a new Secure Enhanced Heading-direction Angle Routing Protocol (SEHARP) for ad hoc networks based on the integration of security mechanisms that could be applied to the EHARP routing protocol. Thirdly, we present a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates. We also propose an access activity diagram which explains the steps taken by a node. Security depends on access to the history of each unit, which is used to calculate the cooperative values of each node in the environment

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Aerial base stations with opportunistic links for next generation emergency communications

    Get PDF
    Rapidly deployable and reliable mission-critical communication networks are fundamental requirements to guarantee the successful operations of public safety officers during disaster recovery and crisis management preparedness. The ABSOLUTE project focused on designing, prototyping, and demonstrating a high-capacity IP mobile data network with low latency and large coverage suitable for many forms of multimedia delivery including public safety scenarios. The ABSOLUTE project combines aerial, terrestrial, and satellites communication networks for providing a robust standalone system able to deliver resilience communication systems. This article focuses on describing the main outcomes of the ABSOLUTE project in terms of network and system architecture, regulations, and implementation of aerial base stations, portable land mobile units, satellite backhauling, S-MIM satellite messaging, and multimode user equipments

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms
    corecore