5 research outputs found

    Increased Persistence of Wi-Fi Direct Networks for Smartphone-based Collision Avoidance

    Get PDF
    Inter-vehicular communication is a promising technology to improve road safety. Inter-vehicular communication over a wireless medium can be used to exchange important information such as the speed, location, and headings of a vehicle with nearby vehicles. Using this information, it is possible to calculate if a collision is imminent and warn the driver to take action. Wi-Fi can also be used to share this information, however it requires an access point hardware to facilitate communication. Wi-Fi Direct enabled devices can share information without a hardware access point. Wi-Fi Direct provides peer to peer communication by employing a software defined access point embedded within the system. Wi-Fi Direct is a technology that is present on many smart phones, eliminating the need for dedicated access point hardware. In collision avoidance application, Wi-Fi Direct maybe used to exchange safety-related information between vehicles. Collision avoidance systems developed using smartphones can also be extended to protecting pedestrians carrying a smartphone and in this role they could be a long-term solution for certain vulnerable road user collision scenarios. Smartphones with Wi-Fi Direct capability could provide a path to early, low-cost implementation of inter-vehicle communication for collision avoidance. However, there are many limitations to such a system that are addressed in this thesis. Wi-Fi Direct functions by creating groups. One of the nodes in the group is elected as the group owner that acts as an access point and manages the communication between the nodes within the group. If the group owner moves out of range, reforming the group is a lengthy process. This thesis proposes a new method for nomination of the group owner to reduce the likelihood that the group owner will move out of range. This thesis introduces the concept of nominating a Backup Group Owner that can quickly replace the group owner if the group owner shuts down or moves out of range of the group. An orderly handoff from the group owner to the Backup Group Owner can prevent loss of communication among nodes. An analytical study of the amount of time saved by adopting the proposed method of electing the BGO is presented

    Cyber Network Resilience against Self-Propagating Malware Attacks

    Full text link
    Self-propagating malware (SPM) has led to huge financial losses, major data breaches, and widespread service disruptions in recent years. In this paper, we explore the problem of developing cyber resilient systems capable of mitigating the spread of SPM attacks. We begin with an in-depth study of a well-known self-propagating malware, WannaCry, and present a compartmental model called SIIDR that accurately captures the behavior observed in real-world attack traces. Next, we investigate ten cyber defense techniques, including existing edge and node hardening strategies, as well as newly developed methods based on reconfiguring network communication (NodeSplit) and isolating communities. We evaluate all defense strategies in detail using six real-world communication graphs collected from a large retail network and compare their performance across a wide range of attacks and network topologies. We show that several of these defenses are able to efficiently reduce the spread of SPM attacks modeled with SIIDR. For instance, given a strong attack that infects 97% of nodes when no defense is employed, strategically securing a small number of nodes (0.08%) reduces the infection footprint in one of the networks down to 1%.Comment: 20 page

    Book of Abstracts of the 2nd International Conference on Applied Mathematics and Computational Sciences (ICAMCS-2022)

    No full text
    It is a great privilege for us to present the abstract book of ICAMCS-2022 to the authors and the delegates of the event. We hope that you will find it useful, valuable, aspiring, and inspiring. This book is a record of abstracts of the keynote talks, invited talks, and papers presented by the participants, which indicates the progress and state of development in research at the time of writing the research article. It is an invaluable asset to all researchers. The book provides a permanent record of this asset. Conference Title: 2nd International Conference on Applied Mathematics and Computational SciencesConference Acronym: ICAMCS-2022Conference Date: 12-14 October 2022Conference Organizers: DIT University, Dehradun, IndiaConference Mode: Online (Virtual

    Abstracts of National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020

    No full text
    This book presents the abstracts of the papers presented to the Online National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020 (RDMPMC-2020) held on 26th and 27th August 2020 organized by the Department of Metallurgical and Materials Science in Association with the Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, India. Conference Title: National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020Conference Acronym: RDMPMC-2020Conference Date: 26–27 August 2020Conference Location: Online (Virtual Mode)Conference Organizer: Department of Metallurgical and Materials Engineering, National Institute of Technology JamshedpurCo-organizer: Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, IndiaConference Sponsor: TEQIP-
    corecore