5 research outputs found
Increased Persistence of Wi-Fi Direct Networks for Smartphone-based Collision Avoidance
Inter-vehicular communication is a promising technology to improve road safety. Inter-vehicular communication over a wireless medium can be used to exchange important information such as the speed, location, and headings of a vehicle with nearby vehicles. Using this information, it is possible to calculate if a collision is imminent and warn the driver to take action. Wi-Fi can also be used to share this information, however it requires an access point hardware to facilitate communication. Wi-Fi Direct enabled devices can share information without a hardware access point.
Wi-Fi Direct provides peer to peer communication by employing a software defined access point embedded within the system. Wi-Fi Direct is a technology that is present on many smart phones, eliminating the need for dedicated access point hardware. In collision avoidance application, Wi-Fi Direct maybe used to exchange safety-related information between vehicles. Collision avoidance systems developed using smartphones can also be extended to protecting pedestrians carrying a smartphone and in this role they could be a long-term solution for certain vulnerable road user collision scenarios. Smartphones with Wi-Fi Direct capability could provide a path to early, low-cost implementation of inter-vehicle communication for collision avoidance. However, there are many limitations to such a system that are addressed in this thesis.
Wi-Fi Direct functions by creating groups. One of the nodes in the group is elected as the group owner that acts as an access point and manages the communication between the nodes within the group. If the group owner moves out of range, reforming the group is a lengthy process. This thesis proposes a new method for nomination of the group owner to reduce the likelihood that the group owner will move out of range.
This thesis introduces the concept of nominating a Backup Group Owner that can quickly replace the group owner if the group owner shuts down or moves out of range of the group. An orderly handoff from the group owner to the Backup Group Owner can prevent loss of communication among nodes. An analytical study of the amount of time saved by adopting the proposed method of electing the BGO is presented
Cyber Network Resilience against Self-Propagating Malware Attacks
Self-propagating malware (SPM) has led to huge financial losses, major data
breaches, and widespread service disruptions in recent years. In this paper, we
explore the problem of developing cyber resilient systems capable of mitigating
the spread of SPM attacks. We begin with an in-depth study of a well-known
self-propagating malware, WannaCry, and present a compartmental model called
SIIDR that accurately captures the behavior observed in real-world attack
traces. Next, we investigate ten cyber defense techniques, including existing
edge and node hardening strategies, as well as newly developed methods based on
reconfiguring network communication (NodeSplit) and isolating communities. We
evaluate all defense strategies in detail using six real-world communication
graphs collected from a large retail network and compare their performance
across a wide range of attacks and network topologies. We show that several of
these defenses are able to efficiently reduce the spread of SPM attacks modeled
with SIIDR. For instance, given a strong attack that infects 97% of nodes when
no defense is employed, strategically securing a small number of nodes (0.08%)
reduces the infection footprint in one of the networks down to 1%.Comment: 20 page
Book of Abstracts of the 2nd International Conference on Applied Mathematics and Computational Sciences (ICAMCS-2022)
It is a great privilege for us to present the abstract book of ICAMCS-2022 to the authors and the delegates of the event. We hope that you will find it useful, valuable, aspiring, and inspiring. This book is a record of abstracts of the keynote talks, invited talks, and papers presented by the participants, which indicates the progress and state of development in research at the time of writing the research article. It is an invaluable asset to all researchers. The book provides a permanent record of this asset.
Conference Title: 2nd International Conference on Applied Mathematics and Computational SciencesConference Acronym: ICAMCS-2022Conference Date: 12-14 October 2022Conference Organizers:Â DIT University, Dehradun, IndiaConference Mode: Online (Virtual
Abstracts of National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020
This book presents the abstracts of the papers presented to the Online National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020 (RDMPMC-2020) held on 26th and 27th August 2020 organized by the Department of Metallurgical and Materials Science in Association with the Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, India.
Conference Title: National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020Conference Acronym: RDMPMC-2020Conference Date: 26–27 August 2020Conference Location: Online (Virtual Mode)Conference Organizer: Department of Metallurgical and Materials Engineering, National Institute of Technology JamshedpurCo-organizer: Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, IndiaConference Sponsor: TEQIP-