12 research outputs found

    Reconfigurable middleware architectures for large scale sensor networks

    Get PDF
    Wireless sensor networks, in an effort to be energy efficient, typically lack the high-level abstractions of advanced programming languages. Though strong, the dichotomy between these two paradigms can be overcome. The SENSIX software framework, described in this dissertation, uniquely integrates constraint-dominated wireless sensor networks with the flexibility of object-oriented programming models, without violating the principles of either. Though these two computing paradigms are contradictory in many ways, SENSIX bridges them to yield a dynamic middleware abstraction unifying low-level resource-aware task reconfiguration and high-level object recomposition. Through the layered approach of SENSIX, the software developer creates a domain-specific sensing architecture by defining a customized task specification and utilizing object inheritance. In addition, SENSIX performs better at large scales (on the order of 1000 nodes or more) than other sensor network middleware which do not include such unified facilities for vertical integration

    Routing schemes in FANETs: a survey

    Get PDF
    Flying ad hoc network (FANET) is a self-organizing wireless network that enables inexpensive, flexible, and easy-to-deploy flying nodes, such as unmanned aerial vehicles (UAVs), to communicate among themselves in the absence of fixed network infrastructure. FANET is one of the emerging networks that has an extensive range of next-generation applications. Hence, FANET plays a significant role in achieving application-based goals. Routing enables the flying nodes to collaborate and coordinate among themselves and to establish routes to radio access infrastructure, particularly FANET base station (BS). With a longer route lifetime, the effects of link disconnections and network partitions reduce. Routing must cater to two main characteristics of FANETs that reduce the route lifetime. Firstly, the collaboration nature requires the flying nodes to exchange messages and to coordinate among themselves, causing high energy consumption. Secondly, the mobility pattern of the flying nodes is highly dynamic in a three-dimensional space and they may be spaced far apart, causing link disconnection. In this paper, we present a comprehensive survey of the limited research work of routing schemes in FANETs. Different aspects, including objectives, challenges, routing metrics, characteristics, and performance measures, are covered. Furthermore, we present open issues

    Proceedings, MSVSCC 2012

    Get PDF
    Proceedings of the 6th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 19, 2012 at VMASC in Suffolk, Virginia

    A Fog Computing Architecture for Disaster Response Networks

    Get PDF
    In the aftermath of a disaster, the impacted communication infrastructure is unable to provide first responders with a reliable medium of communication. Delay tolerant networks that leverage mobility in the area have been proposed as a scalable solution that can be deployed quickly. Such disaster response networks (DRNs) typically have limited capacity due to frequent disconnections in the network, and under-perform when saturated with data. On the other hand, there is a large amount of data being produced and consumed due to the recent popularity of smartphones and the cloud computing paradigm. Fog Computing brings the cloud computing paradigm to the complex environments that DRNs operate in. The proposed architecture addresses the key challenges of ensuring high situational awareness and energy efficiency when such DRNs are saturated with large amounts of data. Situational awareness is increased by providing data reliably, and at a high temporal and spatial resolution. A waypoint placement algorithm places hardware in the disaster struck area such that the aggregate good-put is maximized. The Raven routing framework allows for risk-averse data delivery by allowing the user to control the variance of the packet delivery delay. The Pareto frontier between performance and energy consumption is discovered, and the DRN is made to operate at these Pareto optimal points. The FuzLoc distributed protocol enables mobile self-localization in indoor environments. The architecture has been evaluated in realistic scenarios involving deployments of multiple vehicles and devices

    Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    Get PDF
    Includes supplementary materialDisaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) process to address the military’s command and control capability gap. During the process, the R2C2 team conducted mission analysis, generated requirements, developed and modeled architectures, and analyzed and compared current operational systems versus the team’s R2C2 system. The R2C2 system provided a reachback capability to the Regional Combatant Commander’s (RCC) headquarters, a local communications network for situational assessments, and Internet access for civilian counterparts participating in Humanitarian Assistance/Disaster Relief operations. Because the team designed the R2C2 system to be modular, analysis concluded that the R2C2 system was the preferred method to provide the RCC with the required flexibility and scalability to deliver a rapidly deployable command and control capability to perform the range of military operations

    Communication Security in Wireless Sensor Networks

    Get PDF
    A wireless sensor network (WSN) usually consists of a large number of small, low-cost devices that have limited energy supply, computation, memory, and communication capacities. Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Communication security is essential to the success of WSN applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in WSNs has ever been a challenging task due to various network & resource constraints and malicious attacks. This motivates the research on communication security for WSNs. This dissertation studies communication security in WSNs with respect to three important aspects. The first study addresses broadcast/multicast security in WSNs. We propose a multi-user broadcast authentication technique, which overcomes the security vulnerability of existing solutions. The proposed scheme guarantees immediate broadcast authentication by employing public key cryptography, and achieves the efficiency through integrating various techniques from different domains. We also address multicast encryption to solve data confidentiality concern for secure multicast. We propose an efficient multicast key management scheme supporting a wide range of multicast semantics, which utilizes the fact that sensors are both routers and end-receivers. The second study addresses data report security in WSNs. We propose a location-aware end-to-end security framework for WSNs, in which secret keys are bound to geographic locations so that the impact of sensor compromise are limited only to their vicinity. The proposed scheme effectively defeats not only bogus data injection attacks but also various DoS attacks. In this study, we also address event boundary detection as a specific case of secure data aggregation in WSNs. We propose a secure and fault-tolerant event boundary detection scheme, which securely detects the boundaries of large spatial events in a localized statistic manner. The third study addresses random key pre-distribution in WSNs. We propose a keyed-hash-chain-based key pool generation technique, which leads to a more efficient key pre-distribution scheme with better security resilience in the case of sensor compromise

    Air Force Institute of Technology Research Report 2000

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics

    Winter 2008 Full Issue

    Get PDF

    Earth Observations and the Role of UAVs: A Capabilities Assessment

    Get PDF
    This document provides an assessment of the civil UAV missions and technologies and is intended to parallel the Office of the Secretary of Defense UAV Roadmap. The intent of this document is four-fold: 1. Determine and document desired future missions of Earth observation UAVs based on user-defined needs 2. Determine and document the technologies necessary to support those missions 3. Discuss the present state of the platform capabilities and required technologies, identifying those in progress, those planned, and those for which no current plans exist 4. Provide the foundations for development of a comprehensive civil UAV roadmap to complement the Department of Defense (DoD) effort (http://www.acq.osd.mil/uas/). Two aspects of the President's Management Agenda (refer to the document located at: www.whitehouse.gov/omb/budget/fy2002/mgmt.pdf ) are supported by this undertaking. First, it is one that will engage multiple Agencies in the effort as stakeholders and benefactors of the systems. In that sense, the market will be driven by the user requirements and applications. The second aspect is one of supporting economic development in the commercial sector. Market forecasts for the civil use of UAVs have indicated an infant market stage at present with a sustained forecasted growth. There is some difficulty in quantifying the value of the market since the typical estimate excludes system components other than the aerial platforms. Section 2.4 addresses the civil UAV market forecast and lists several independent forecasts. One conclusion that can be drawn from these forecasts is that all show a sustained growth for the duration of each long-term forecast

    Earth Observations and the Role of UAVs: A Capabilities Assessment

    Get PDF
    This three-volume document, based on the draft document located on the website given on page 6, presents the findings of a NASA-led capabilities assessment of Uninhabited Aerial Vehicles (UAVs) for civil (defined as non-DoD) use in Earth observations. Volume 1 is the report that presents the overall assessment and summarizes the data. The second volume contains the appendices and references to address the technologies and capabilities required for viable UAV missions. The third volume is the living portion of this effort and contains the outputs from each of the Technology Working Groups (TWGs) along with the reviews conducted by the Universities Space Research Association (USRA). The focus of this report, intended to complement the Office of the Secretary of Defense UAV Roadmap, is four-fold: 1) To determine and document desired future Earth observation missions for all UAVs based on user-defined needs; 2) To determine and document the technologies necessary to support those missions; 3) To discuss the present state of the art platform capabilities and required technologies, including identifying those in progress, those planned, and those for which no current plans exist; 4) Provide the foundations for development of a comprehensive civil UAV roadmap. It is expected that the content of this report will be updated periodically and used to assess the feasibility of future missions. In addition, this report will provide the foundation to help influence funding decisions to develop those technologies that are considered enabling or necessary but are not contained within approved funding plans. This document is written such that each section will be supported by an Appendix that will give the reader a more detailed discussion of that section's topical materials
    corecore