21,611 research outputs found
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
A Comparative Survey of Optical Wireless Technologies: Architectures and Applications
New high-data-rate multimedia services and applications are evolving
continuously and exponentially increasing the demand for wireless capacity of
fifth-generation (5G) and beyond. The existing radio frequency (RF)
communication spectrum is insufficient to meet the demands of future
high-datarate 5G services. Optical wireless communication (OWC), which uses an
ultra-wide range of unregulated spectrum, has emerged as a promising solution
to overcome the RF spectrum crisis. It has attracted growing research interest
worldwide in the last decade for indoor and outdoor applications. OWC offloads
huge data traffic applications from RF networks. A 100 Gb/s data rate has
already been demonstrated through OWC. It offers services indoors as well as
outdoors, and communication distances range from several nm to more than 10000
km. This paper provides a technology overview and a review on optical wireless
technologies, such as visible light communication, light fidelity, optical
camera communication, free space optical communication, and light detection and
ranging. We survey the key technologies for understanding OWC and present
state-of-the-art criteria in aspects, such as classification, spectrum use,
architecture, and applications. The key contribution of this paper is to
clarify the differences among different promising optical wireless technologies
and between these technologies and their corresponding similar existing RF
technologie
Autonomous Capabilities for Small Unmanned Aerial Systems Conducting Radiological Response: Findings from a High-fidelity Discovery Experiment
This article presents a preliminary work domain theory and identifies autonomous vehicle, navigational, and mission capabilities and challenges for small unmanned aerial systems (SUASs) responding to a radiological disaster. Radiological events are representative of applications that involve flying at low altitudes and close proximities to structures. To more formally understand the guidance and control demands, the environment in which the SUAS has to function, and the expected missions, tasks, and strategies to respond to an incident, a discovery experiment was performed in 2013. The experiment placed a radiological source emitting at 10 times background radiation in the simulated collapse of a multistory hospital. Two SUASs, an AirRobot 100B and a Leptron Avenger, were inserted with subject matter experts into the response, providing high operational fidelity. The SUASs were expected by the responders to fly at altitudes between 0.3 and 30 m, and hover at 1.5 m from urban structures. The proximity to a building introduced a decrease in GPS satellite coverage, challenging existing vehicle autonomy. Five new navigational capabilities were identified: scan, obstacle avoidance, contour following, environment-aware return to home, andreturn to highest reading. Furthermore, the data-to-decision process could be improved with autonomous data digestion and visualization capabilities. This article is expected to contribute to a better understanding of autonomy in a SUAS, serve as a requirement document for advanced autonomy, and illustrate how discovery experimentation serves as a design tool for autonomous vehicles
Implementation of Wi-Ap; An IEEE 802.11b/g Based Electrical Switch Module With Web Enabled Interface for Electrical Appliances Control
The aim of this research study is to design and implement a Wi-Fi-based control panel for remote
control of lights and electrical appliances with a web functionality that allows for wide area control via the
intranet or Internet. This eliminates the inconvenience of moving from one switch to another for analog
operation of light fixtures and appliance in home, office and campus environment. The wireless technology we
adopted is IEEE 802.11 (2008) b/g, also called Wi-Fi (Wireless Fidelity) which operates in free band and is
easily accessible. Wi-Ap (Wi-Fi Automated Appliance) control system contains a web portal which allows for
management and control purposes via the intranet or Internet. We built a standalone Wi-Ap console that allows
the wireless switching on and off of any appliance(s) that is(are) ) plugged into it. The prototype we built was
tested within the Electrical and Information Engineering department, Covenant University, Nigeria intranet and
the test achieved our aim of remote appliances control from a web portal vial the intranet
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
- …
