17 research outputs found
Secure Ad Hoc Routing Protocols With Detection, Identification And Self-Healing Capabilities
Devices taking part in mobile ad hoc networks (MANET) co-operate with each other to route packets by strictly adhering to the ad hoc routing protocol in use. Malicious nodes taking part in co-operative routing can launch a wide variety of attacks to reduce the utility of MANETs. The aim of secure routing protocols is to ensure that MANETs can continue to function even in the face of malicious nodes. Secure routing protocols should have measures to dissuade attackers by detecting inconsistencies, identifying the perpetrator responsible for the inconsistency, and provide means to inhibit the role of misbehaving nodes. Most existing secure routing protocols try to achieve only first step, viz., detection of inconsistencies. This dissertation research investigates and proposes efficient strategies that substantially enhance the scope of assurances provided by secure MANET routing protocols while keeping the overhead low
Recommended from our members
Modeling Natural Hazards Engineering Data to Cyberinfrastructure
DesignSafe-CI is an end-to-end data lifecycle management, analysis, and publication cloud platform for natural hazards engineering. To facilitate ongoing data curation and sharing in a cloud environment that is intuitive to the end users, developers and curators teamed with experts in the different hazards to design data models and vocabularies that map their research workflows and domain terminology. The experimental data models - six - emphasize provenance through relationships between research processes, data and their documentation, and highlight commonalities between experiment types. They mediate between the user interface and the repository layers of the cyberinfrastructure to automate tasks such as organizing data and facilitating its description. Using data from triaxial experiments, we conducted a user evaluation of the geotechnical data model, both for its fitness to real data and for purposes of data understandability during reuse. The results of the evaluation guided testing and selection of the Fedora 4 repository backend to enhance data discovery and reuse.National Science FoundationTexas Advanced Computing Center (TACC
Computing environments for reproducibility: Capturing the 'Whole Tale'
The act of sharing scientific knowledge is rapidly evolving away from traditional articles and presentations to the delivery of executable objects that integrate the data and computational details (e.g., scripts and workflows) upon which the findings rely. This envisioned coupling of data and process is essential to advancing science but faces technical and institutional barriers. The Whole Tale project aims to address these barriers by connecting computational, data-intensive research efforts with the larger research process—transforming the knowledge discovery and dissemination process into one where data products are united with research articles to create “living publications” or tales. The Whole Tale focuses on the full spectrum of science, empowering users in the long tail of science, and power users with demands for access to big data and compute resources. We report here on the design, architecture, and implementation of the Whole Tale environment
Recommended from our members
Research Data Management Principles, Practices, and Prospects
This report examines how research institutions are responding to data management requirements of the National Science Foundation, National Institutes of Health, and other federal agencies. It also considers what role, if any, academic libraries and the library and information science profession should have in supporting researchers’ data management needs. University of North Texas (UNT) Library Director Martin Halbert opens the report with an overview of the DataRes Project, a two-year investigation of data management practices conducted at UNT with colleagues Spencer D. C. Keralis, Shannon Stark, and William E. Moen. His introduction is followed by a series of papers that were presented at the DataRes Symposium that UNT organized in December 2012
Secure Ad Hoc Routing Protocols With Detection, Identification And Self-Healing Capabilities
Devices taking part in mobile ad hoc networks (MANET) co-operate with each other to route packets by strictly adhering to the ad hoc routing protocol in use. Malicious nodes taking part in co-operative routing can launch a wide variety of attacks to reduce the utility of MANETs. The aim of secure routing protocols is to ensure that MANETs can continue to function even in the face of malicious nodes. Secure routing protocols should have measures to dissuade attackers by detecting inconsistencies, identifying the perpetrator responsible for the inconsistency, and provide means to inhibit the role of misbehaving nodes. Most existing secure routing protocols try to achieve only first step, viz., detection of inconsistencies. This dissertation research investigates and proposes efficient strategies that substantially enhance the scope of assurances provided by secure MANET routing protocols while keeping the overhead low