Current Search: wireless (x)
Pages
-
-
Title
-
AN INTERACTIVE DISTRIBUTED SIMULATION FRAMEWORK WITH APPLICATION TO WIRELESS NETWORKS AND INTRUSION DETECTION.
-
Creator
-
Kachirski, Oleg, Guha, Ratan, University of Central Florida
-
Abstract / Description
-
In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the...
Show moreIn this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a network of computers with no modifications to the code or user objects. A visual graphical interface precisely depicts simulation object states and interactions throughout the simulation execution, giving the user full control over the simulation in real time. The network configuration is detected by the framework, and communication latency is taken into consideration when dynamically adjusting the simulation clock, allowing the simulation to run on a heterogeneous computing system. The simulation framework is easily extensible to multi-cluster systems and computing grids. An entire simulation system can be constructed in a short time, utilizing user-created and supplied simulation components, including mobile nodes, base stations, routing algorithms, traffic patterns and other objects. These objects are automatically compiled and loaded by the simulation system, and are available for dynamic simulation injection at runtime. Using our distributed simulation framework, we have studied modern intrusion detection systems (IDS) and assessed applicability of existing intrusion detection techniques to wireless networks. We have developed a mobile agent-based IDS targeting mobile wireless networks, and introduced load-balancing optimizations aimed at limited-resource systems to improve intrusion detection performance. Packet-based monitoring agents of our IDS employ a CASE-based reasoner engine that performs fast lookups of network packets in the existing SNORT-based intrusion rule-set. Experiments were performed using the intrusion data from MIT Lincoln Laboratories studies, and executed on a cluster computer utilizing our distributed simulation system.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000642, ucf:46545
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000642
-
-
Title
-
Networking and security solutions for VANET initial deployment stage.
-
Creator
-
Aslam, Baber, Zou, Changchun, Turgut, Damla, Bassiouni, Mostafa, Wang, Chung-Ching, University of Central Florida
-
Abstract / Description
-
Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called (")smart vehicles(")) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle...
Show moreVehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called (")smart vehicles(")) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other hand, the vehicle to infrastructure (V2I) communication has infrastructure architecture where vehicles connect to access points deployed along roads. These access points are known as road side units (RSUs) and vehicles communicate with other vehicles/wired nodes through these RSUs. To provide various services to vehicles, RSUs are generally connected to each other and to the Internet. The direct RSU to RSU communication is also referred as I2I communication. The success of VANET depends on the existence of pervasive roadside infrastructure and sufficient number of smart vehicles. Most VANET applications and services are based on either one or both of these requirements. A fully matured VANET will have pervasive roadside network and enough vehicle density to enable VANET applications. However, the initial deployment stage of VANET will be characterized by the lack of pervasive roadside infrastructure and low market penetration of smart vehicles. It will be economically infeasible to initially install a pervasive and fully networked roadside infrastructure, which could result in the failure of applications and services that depend on V2I or I2I communications. Further, low market penetration means there are insufficient number of smart vehicles to enable V2V communication, which could result in failure of services and applications that depend on V2V communications. Non-availability of pervasive connectivity to certification authorities and dynamic locations of each vehicle will make it difficult and expensive to implement security solutions that are based on some central certificate management authority. Non-availability of pervasive connectivity will also affect the backend connectivity of vehicles to the Internet or the rest of the world. Due to economic considerations, the installation of roadside infrastructure will take a long time and will be incremental thus resulting in a heterogeneous infrastructure with non-consistent capabilities. Similarly, smart vehicles will also have varying degree of capabilities. This will result in failure of applications and services that have very strict requirements on V2I or V2V communications. We have proposed several solutions to overcome the challenges described above that will be faced during the initial deployment stage of VANET. Specifically, we have proposed: 1) a VANET architecture that can provide services with limited number of heterogeneous roadside units and smart vehicles with varying capabilities, 2) a backend connectivity solution that provides connectivity between the Internet and smart vehicles without requiring pervasive roadside infrastructure or large number of smart vehicles, 3) a security architecture that does not depend on pervasive roadside infrastructure or a fully connected V2V network and fulfills all the security requirements, and 4) optimization solutions for placement of a limited number of RSUs within a given area to provide best possible service to smart vehicles. The optimal placement solutions cover both urban areas and highways environments.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004186, ucf:48993
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004186
-
-
Title
-
Wireless Power Transfer for Space Applications: System Design and Electromagnetic Compatibility Compliance of Radiated Emissions.
-
Creator
-
Vazquez Ramos, Gabriel, Yuan, Jiann-Shiun, Sundaram, Kalpathy, Wu, Xinzhang, Soto Toro, Felix, University of Central Florida
-
Abstract / Description
-
This dissertation evaluates the possibility of wireless power transfer (WPT) systems for space applications, with an emphasis in launch vehicles (rockets). After performing literature review for WPT systems, it was identified that magnetic resonance provides the more suited set of characteristics for this application. Advanced analysis, simulation and testing were performed to magnetic resonance WPT systems to acquire system performance insight. This was accomplished by evaluating/varying...
Show moreThis dissertation evaluates the possibility of wireless power transfer (WPT) systems for space applications, with an emphasis in launch vehicles (rockets). After performing literature review for WPT systems, it was identified that magnetic resonance provides the more suited set of characteristics for this application. Advanced analysis, simulation and testing were performed to magnetic resonance WPT systems to acquire system performance insight. This was accomplished by evaluating/varying coupling configuration, load effects and magnetic element physical characteristics (i.e. wire material, loop radius, etc.). It was identified by analysis, circuit simulation and testing that the best coupling configuration for this application was series-series and series-shunt with Litz wire loop inductors. The main concern identified for the implementation of these systems for space applications was radiated emissions that could potentially generate electromagnetic interference (EMI). To address this EMI concern, we developed the Electromagnetic Compatibility Radiated Emissions Compliance Design Evaluation Approach for WPT Space Systems. This approach systematically allocates key analyses, simulations and tests procedures to predict WPT EMC compliance to NASA's EMC standard Mil-Std-461E/F. Three prototype/magnetic elements were successfully assessed by implementing the WPT EMC design approach. The electric fields intensity generated by the WPT prototypes/magnetic elements tested were: 30.02 dBuV/m, 28.90 dBuV/m and 82.13 dBuV/m (requirement limit: 140 dBuV/m). All three prototypes successfully transferred power wirelessly and successfully met the NASA EMC requirements.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004448, ucf:49344
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004448
-
-
Title
-
LOW POWER CMOS CIRCUIT DESIGN AND RELIABILITY ANALYSIS FOR WIRELESS MEMS SENSORS.
-
Creator
-
Sadat, Md Anwar, Yuan, Jiann, University of Central Florida
-
Abstract / Description
-
A sensor node 'AccuMicroMotion' is proposed that has the ability to detect motion in 6 degrees of freedom for the application of physiological activity monitoring. It is expected to be light weight, low power, small and cheap. The sensor node may collect and transmit 3 axes of acceleration and 3 axes of angular rotation signals from MEMS transducers wirelessly to a nearby base station while attached to or implanted in human body. This dissertation proposes a wireless electronic system-on-a...
Show moreA sensor node 'AccuMicroMotion' is proposed that has the ability to detect motion in 6 degrees of freedom for the application of physiological activity monitoring. It is expected to be light weight, low power, small and cheap. The sensor node may collect and transmit 3 axes of acceleration and 3 axes of angular rotation signals from MEMS transducers wirelessly to a nearby base station while attached to or implanted in human body. This dissertation proposes a wireless electronic system-on-a-single-chip to implement the sensor in a traditional CMOS process. The system is low power and may operate 50 hours from a single coin cell battery. A CMOS readout circuit, an analog to digital converter and a wireless transmitter is designed to implement the proposed system. In the architecture of the 'AccuMicroMotion' system, the readout circuit uses chopper stabilization technique and can resolve DC to 1 KHz and 200 nV signals from MEMS transducers. The base band signal is digitized using a 10-bit successive approximation register analog to digital converter. Digitized outputs from up to nine transducers can be combined in a parallel to serial converter for transmission by a 900 MHz RF transmitter that operates in amplitude shift keying modulation technique. The transmitter delivers a 2.2 mW power to a 50 Ù antenna. The system consumes an average current of 4.8 mA from a 3V supply when 6 sensors are in operation and provides an overall 60 dB dynamic range. Furthermore, in this dissertation, a methodology is developed that applies accelerated electrical stress on MOS devices to extract BSIM3 models and RF parameters through measurements to perform comprehensive study, analysis and modeling of several analog and RF circuits under hot carrier and breakdown degradation.
Show less
-
Date Issued
-
2004
-
Identifier
-
CFE0000304, ucf:46318
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000304
-
-
Title
-
A HYBRID ROUTING PROTOCOL FOR COMMUNICATIONS AMONG NODES WITHHIGH RELATIVE SPEED IN WIRELESS MESH NETWORKS.
-
Creator
-
PEPPAS, NIKOLAOS, Turgut, Damla, University of Central Florida
-
Abstract / Description
-
Wireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information....
Show moreWireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information. Through simulations run on a specially built stand alone simulator, based on Java, packet overhead, delivery ratio and latency metrics were monitored with respect to varying number of nodes, node density and mobility. The results showed that the high overhead leads to high delivery ratio while latency tends to increase as the network grows larger. All the metrics revealed sensitivity in high mobility conditions.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001607, ucf:47165
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001607
-
-
Title
-
MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING ALGORITHMS FOR WIRELESS SENSOR NETWORKS.
-
Creator
-
Bag, Anirban, Bassiouni, Mostafa, University of Central Florida
-
Abstract / Description
-
In recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the...
Show moreIn recent years, the development of a large variety of mobile computing devices has led to wide scale deployment and use of wireless ad hoc and sensor networks. Wireless Sensor Networks consist of battery powered, tiny and cheap "motes", having sensing and wireless communication capabilities. Although wireless motes have limited battery power, communication and computation capabilities, the range of their application is vast. In the first part of the dissertation, we have addressed the specific application of Biomedical Sensor Networks. To solve the problem of data routing in these networks, we have proposed the Adaptive Least Temperature Routing (ALTR) algorithm that reduces the average temperature rise of the nodes in the in-vivo network while routing data efficiently. For delay sensitive biomedical applications, we proposed the Hotspot Preventing Routing (HPR) algorithm which avoids the formation of hotspots (regions having very high temperature) in the network. HPR forwards the packets using the shortest path, bypassing the regions of high temperature and thus significantly reduces the average packet delivery delay, making it suitable for real-time applications of in-vivo networks. We also proposed another routing algorithm suitable for being used in a network of id-less biomedical sensor nodes, namely Routing Algorithm for networks of homogeneous and Id-less biomedical sensor Nodes (RAIN). Finally we developed Biocomm, a cross-layer MAC and Routing protocol co-design for Biomedical Sensor Networks, which optimizes the overall performance of an in-vivo network through cross-layer interactions. We performed extensive simulations to show that the proposed Biocomm protocol performs much better than the other existing MAC and Routing protocols in terms of preventing the formation of hotspots, reducing energy consumption of nodes and preventing network congestion when used in an in-vivo network. In the second part of the dissertation, we have addressed the problems of habitat-monitoring sensor networks, broadcast algorithms for sensor networks and the congestion problem in sensor networks as well as one non-sensor network application, namely, on-chip communication networks. Specifically, we have proposed a variation of HPR algorithm, called Hotspot Preventing Adaptive Routing (HPAR) algorithm, for efficient data routing in Networks On-Chip catering to their specific hotspot prevention issues. A protocol similar to ALTR has been shown to perform well in a sensor network deployed for habitat monitoring. We developed a reliable, low overhead broadcast algorithm for sensor networks namely Topology Adaptive Gossip (TAG) algorithm. To reduce the congestion problem in Wireless Sensor Networks, we proposed a tunable cross-layer Congestion Reducing Medium Access Control (CRMAC) protocol that utilizes buffer status information from the Network layer to give prioritized medium access to congested nodes in the MAC layer and thus preventing congestion and packet drops. CRMAC can also be easily tuned to satisfy different application-specific performance requirements. With the help of extensive simulation results we have shown how CRMAC can be adapted to perform well in different applications of Sensor Network like Emergency Situation that requires a high network throughput and low packet delivery latency or Long-term Monitoring application requiring energy conservation.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001915, ucf:47480
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001915
-
-
Title
-
Scalable Network Design and Management with Decentralized Software-defined Networking.
-
Creator
-
Atwal, Kuldip Singh, Bassiouni, Mostafa, Fu, Xinwen, Zou, Changchun, Deo, Narsingh, University of Central Florida
-
Abstract / Description
-
Network softwarization is among the most significant innovations of computer networks in the last few decades. The lack of uniform and programmable interfaces for network management led to the design of OpenFlow protocol for the university campuses and enterprise networks. This breakthrough coupled with other similar efforts led to an emergence of two complementary but independent paradigms called software-defined networking (SDN) and network function virtualization (NFV). As of this writing,...
Show moreNetwork softwarization is among the most significant innovations of computer networks in the last few decades. The lack of uniform and programmable interfaces for network management led to the design of OpenFlow protocol for the university campuses and enterprise networks. This breakthrough coupled with other similar efforts led to an emergence of two complementary but independent paradigms called software-defined networking (SDN) and network function virtualization (NFV). As of this writing, these paradigms are becoming the de-facto norms of wired and wireless networks alike. This dissertation mainly addresses the scalability aspect of SDN for multiple network types. Although centralized control and separation of control and data planes play a pivotal role for ease of network management, these concepts bring in many challenges as well. Scalability is among the most crucial challenges due to the unprecedented growth of computer networks in the past few years. Therefore, we strive to grapple with this problem in diverse networking scenarios and propose novel solutions by harnessing capabilities provided by SDN and other related technologies. Specifically, we present the techniques to deploy SDN at the Internet scale and to extend the concepts of softwarization for mobile access networks and vehicular networks. Multiple optimizations are employed to mitigate latency and other overheads that contribute to achieve performance gains. Additionally, by taking care of sparse connectivity and high mobility, the intrinsic constraints of centralization for wireless ad-hoc networks are addressed in a systematic manner. The state-of-the-art virtualization techniques are coupled with cloud computing methods to exploit the potential of softwarization in general and SDN in particular. Finally, by tapping into the capabilities of machine learning techniques, an SDN-based solution is proposed that inches closer towards the longstanding goal of self-driving networks. Extensive experiments performed on a large-scale testbed corroborates effectiveness of our approaches.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007600, ucf:52543
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007600
-
-
Title
-
Surface Acoustic Wave (SAW) Cryogenic Liquid and Hydrogen Gas Sensors.
-
Creator
-
Fisher, Brian, Malocha, Donald, Gong, Xun, Likamwa, Patrick, Richie, Samuel, Youngquist, Robert, University of Central Florida
-
Abstract / Description
-
This research was born from NASA Kennedy Space Center's (KSC) need for passive, wireless and individually distinguishable cryogenic liquid and H2 gas sensors in various facilities. The risks of catastrophic accidents, associated with the storage and use of cryogenic fluids may be minimized by constant monitoring. Accidents involving the release of H2 gas or LH2 were responsible for 81% of total accidents in the aerospace industry. These problems may be mitigated by the implementation of a...
Show moreThis research was born from NASA Kennedy Space Center's (KSC) need for passive, wireless and individually distinguishable cryogenic liquid and H2 gas sensors in various facilities. The risks of catastrophic accidents, associated with the storage and use of cryogenic fluids may be minimized by constant monitoring. Accidents involving the release of H2 gas or LH2 were responsible for 81% of total accidents in the aerospace industry. These problems may be mitigated by the implementation of a passive (or low-power), wireless, gas detection system, which continuously monitors multiple nodes and reports temperature and H2 gas presence. Passive, wireless, cryogenic liquid level and hydrogen (H2) gas sensors were developed on a platform technology called Orthogonal Frequency Coded (OFC) surface acoustic wave (SAW) radio frequency identification (RFID) tag sensors. The OFC-SAW was shown to be mechanically resistant to failure due to thermal shock from repeated cycles between room to liquid nitrogen temperature. This suggests that these tags are ideal for integration into cryogenic Dewar environments for the purposes of cryogenic liquid level detection. Three OFC-SAW H2 gas sensors were simultaneously wirelessly interrogated while being exposed to various flow rates of H2 gas. Rapid H2 detection was achieved for flow rates as low as 1ccm of a 2% H2, 98% N2 mixture. A novel method and theory to extract the electrical and mechanical properties of a semiconducting and high conductivity thin-film using SAW amplitude and velocity dispersion measurements were also developed. The SAW device was shown to be a useful tool in analysis and characterization of ultrathin and thin films and physical phenomena such as gas adsorption and desorption mechanisms.?
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004536, ucf:49258
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004536
-
-
Title
-
SPECTRUM SHARING AND SERVICE PRICING IN DYNAMIC SPECTRUM ACCESS NETWORKS.
-
Creator
-
Brahma, Swastik, Chatterjee, Mainak, University of Central Florida
-
Abstract / Description
-
Traditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the...
Show moreTraditionally, radio spectrum has been statically allocated to wireless service providers (WSPs). Regulators, like FCC, give wireless service providers exclusive long term licenses for using specific range of frequencies in particular geographic areas. Moreover, restrictions are imposed on the technologies to be used and the services to be provided. The lack of flexibility in static spectrum allocation constrains the ability to make use of new technologies and the ability to redeploy the spectrum to higher valued uses, thereby resulting in inefficient spectrum utilization [23, 38, 42, 62, 67]. These limitations have motivated a paradigm shift from static spectrum allocation towards a more 'liberalized' notion of spectrum management in which secondary users can borrow idle spectrum from primary spectrum licensees, without causing harmful interference to the latter- a notion commonly referred to as dynamic spectrum access (DSA) or open spectrum access ,. Cognitive radio [30, 47], empowered by Software Defined Radio (SDR), is poised to promote the efficient use of spectrum by adopting this open spectrum approach. In this dissertation, we first address the problem of dynamic channel (spectrum) access by a set of cognitive radio enabled nodes, where each node acting in a selfish manner tries to access and use as many channels as possible, subject to the interference constraints. We model the dynamic channel access problem as a modified Rubinstein-Stahl bargaining game. In our model, each node negotiates with the other nodes to obtain an agreeable sharing rule of the available channels, such that, no two interfering nodes use the same channel. We solve the bargaining game by finding Subgame Perfect Nash Equilibrium (SPNE) strategies of the nodes. First, we consider finite horizon version of the bargaining game and investigate its SPNE strategies that allow each node to maximize its utility against the other nodes (opponents). We then extend these results to the infinite horizon bargaining game. Furthermore, we identify Pareto optimal equilibria of the game for improving spectrum utilization. The bargaining solution ensures that no node is starved of channels. The spectrum that a secondary node acquires comes to it at a cost. Thus it becomes important to study the 'end system' perspective of such a cost, by focusing on its implications. Specifically, we consider the problem of incentivizing nodes to provide the service of routing using the acquired spectrum. In this problem, each secondary node having a certain capacity incurs a cost for routing traffic through it. Secondary nodes will not have an incentive to relay traffic unless they are compensated for the costs they incur in forwarding traffic. We propose a path auction scheme in which each secondary node announces its cost and capacity to the routing mechanism, both of which are considered as private information known only to the node. We design a route selection mechanism and a pricing function that can induce nodes to reveal their cost and capacity honestly (making our auction truthful), while minimizing the payment that needs to be given to the nodes (making our auction optimal). By considering capacity constraint of the nodes, we explicitly support multiple path routing. For deploying our path auction based routing mechanism in DSA networks, we provide polynomial time algorithms to find the optimal route over which traffic should be routed and to compute the payment that each node should receive. All our proposed algorithms have been evaluated via extensive simulation experiments. These results help to validate our design philosophy and also illustrate the effectiveness of our solution approach.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0004049, ucf:49125
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004049
-
-
Title
-
SEARCH AND DELIVERY TECHNIQUES IN PEER-TO-PEER NETWORKS.
-
Creator
-
Do, Tai, Hua, Kien, University of Central Florida
-
Abstract / Description
-
The presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To...
Show moreThe presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To fully realize the potential of the peer-to-peer technology, there is a need to define and provide a set of core competencies, serving as the basic services upon which various peer-to-peer applications can be built on. Among these core competencies, this dissertation focuses on two fundamental services, which are search and delivery. In the first part of the dissertation, delivery techniques to support video-on-demand services in wireline and wireless P2P networks are investigated. Video services are considered due to two reasons. First, video services are the pivotal basis for many other multimedia applications. Second, it is challenging to provide on-demand video services due to asynchronous playback progresses at peers. The proposed techniques enable efficient video sharing between peers with asynchronous playback progresses, and maximize peer bandwidth utilization. In the second part of the dissertation, the problem of supporting continuous moving range queries in wireless mobile peer-to-peer networks is studied. Continuous moving range queries have a number of applications when a moving object wants to monitor its surrounding environment for a period of time. When a fixed network infrastructure is not available, wireless mobile peer-to-peer networks become a viable option to support the continuous query system. The proposed distributed solution ensures the accuracy of the query results under realistic assumptions, and incurs much less overhead than alternative solutions.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002753, ucf:48111
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002753
-
-
Title
-
STRUCTURAL HEALTH MONITORING FOR DAMAGE DETECTION USING WIRED AND WIRELESS SENSOR CLUSTERS.
-
Creator
-
Terrell, Thomas, Catbas, Necati, University of Central Florida
-
Abstract / Description
-
Sensing and analysis of a structure for the purpose of detecting, tracking, and evaluating damage and deterioration, during both regular operation and extreme events, is referred to as Structural Health Monitoring (SHM). SHM is a multi-disciplinary field, with a complete system incorporating sensing technology, hardware, signal processing, networking, data analysis, and management for interpretation and decision making. However, many of these processes and subsequent integration into a...
Show moreSensing and analysis of a structure for the purpose of detecting, tracking, and evaluating damage and deterioration, during both regular operation and extreme events, is referred to as Structural Health Monitoring (SHM). SHM is a multi-disciplinary field, with a complete system incorporating sensing technology, hardware, signal processing, networking, data analysis, and management for interpretation and decision making. However, many of these processes and subsequent integration into a practical SHM framework are in need of development. In this study, various components of an SHM system will be investigated. A particular focus is paid to the investigation of a previously developed damage detection methodology for global condition assessment of a laboratory structure with a decking system. First, a review of some of the current SHM applications, which relate to a current UCF Structures SHM study monitoring a full-scale movable bridge, will be presented in conjunction with a summary of the critical components for that project. Studies for structural condition assessment of a 4-span bridge-type steel structure using the SHM data collected from laboratory based experiments will then be presented. For this purpose, a time series analysis method using ARX models (Auto-Regressive models with eXogeneous input) for damage detection with free response vibration data will be expanded upon using both wired and wireless acceleration data. Analysis using wireless accelerometers will implement a sensor roaming technique to maintain a dense sensor field, yet require fewer sensors. Using both data types, this ARX based time series analysis method was shown to be effective for damage detection and localization for this relatively complex laboratory structure. Finally, application of the proposed methodologies on a real-life structure will be discussed, along with conclusions and recommendations for future work.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003694, ucf:48837
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003694
-
-
Title
-
Modeling Crowd Mobility and Communication in Wireless Networks.
-
Creator
-
Solmaz, Gurkan, Turgut, Damla, Bassiouni, Mostafa, Guha, Ratan, Goldiez, Brian, University of Central Florida
-
Abstract / Description
-
This dissertation presents contributions to the fields of mobility modeling, wireless sensor networks (WSNs) with mobile sinks, and opportunistic communication in theme parks. The two main directions of our contributions are human mobility models and strategies for the mobile sink positioning and communication in wireless networks.The first direction of the dissertation is related to human mobility modeling. Modeling the movement of human subjects is important to improve the performance of...
Show moreThis dissertation presents contributions to the fields of mobility modeling, wireless sensor networks (WSNs) with mobile sinks, and opportunistic communication in theme parks. The two main directions of our contributions are human mobility models and strategies for the mobile sink positioning and communication in wireless networks.The first direction of the dissertation is related to human mobility modeling. Modeling the movement of human subjects is important to improve the performance of wireless networks with human participants and the validation of such networks through simulations. The movements in areas such as theme parks follow specific patterns that are not taken into consideration by the general purpose mobility models. We develop two types of mobility models of theme park visitors. The first model represents the typical movement of visitors as they are visiting various attractions and landmarks of the park. The second model represents the movement of the visitors as they aim to evacuate the park after a natural or man-made disaster.The second direction focuses on the movement patterns of mobile sinks and their communication in responding to various events and incidents within the theme park. When an event occurs, the system needs to determine which mobile sink will respond to the event and its trajectory. The overall objective is to optimize the event coverage by minimizing the time needed for the chosen mobile sink to reach the incident area. We extend this work by considering the positioning problem of mobile sinks and preservation of the connected topology. We propose a new variant of p-center problem for optimal placement and communication of the mobile sinks. We provide a solution to this problem through collaborative event coverage of the WSNs with mobile sinks. Finally, we develop a network model with opportunistic communication for tracking the evacuation of theme park visitors during disasters. This model involves people with smartphones that store and carry messages. The mobile sinks are responsible for communicating with the smartphones and reaching out to the regions of the emergent events.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0006005, ucf:51024
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006005
-
-
Title
-
Integrated Microwave Resonator/Antenna Structures for Sensor and Filter Applications.
-
Creator
-
Cheng, Haitao, Gong, Xun, Wahid, Parveen, Wu, Thomas, Kapoor, Vikram, An, Linan, University of Central Florida
-
Abstract / Description
-
This dissertation presents design challenges and promising solutions for temperature and pressure sensors which are highly desirable for harsh-environment applications, such as turbine engines. To survive the harsh environment consisting of high temperatures above 1000oC, high pressures around 300 psi, and corrosive gases, the sensors are required to be robust both electrically and mechanically. In addition, wire connection of the sensors is a challenging packaging problem, which remains...
Show moreThis dissertation presents design challenges and promising solutions for temperature and pressure sensors which are highly desirable for harsh-environment applications, such as turbine engines. To survive the harsh environment consisting of high temperatures above 1000oC, high pressures around 300 psi, and corrosive gases, the sensors are required to be robust both electrically and mechanically. In addition, wire connection of the sensors is a challenging packaging problem, which remains unresolved as of today. In this dissertation, robust ceramic sensors are demonstrated for both high temperature and pressure measurements. Also, the wireless sensors are achieved based on microwave resonators.Two types of temperature sensors are realized using integrated resonator/antennas and reflective patches, respectively. Both types of the sensors utilize alumina substrate which has a temperature-dependent dielectric constant. The temperature in the harsh environment is wirelessly detected by measuring the resonant frequency of the microwave resonator, which is dependent on the substrate permittivity. The integrated resonator/antenna structure minimizes the sensor dimension by adopting a seamless design between the resonator sensor and antenna. This integration technique can be also used to achieve an antenna array integrated with cavity filters. Alternatively, the aforementioned reflective patch sensor works simultaneously as a resonator sensor and a radiation element. Due to its planar structure, the reflective patch sensor is easy for design and fabrication. Both temperature sensors are measured above 1000oC.A pressure sensor is also demonstrated for high-temperature applications. Pressure is detected via the change in resonant frequency of an evanescent-mode resonator which corresponds to cavity deformation under gas pressure. A compact sensor size is achieved with a post loading the cavity resonator and a low-profile antenna connecting to the sensor. Polymer-Derived-Ceramic (PDC) is developed and used for the sensor fabrication. The pressure sensor is characterized under various pressures at high temperatures up to 800oC. In addition, to facilitate sensor characterizations, a robust antenna is developed in order to wirelessly interrogate the sensors. This specially-developed antenna is able to survive a record-setting temperature of 1300oC.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFE0005473, ucf:50335
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005473
-
-
Title
-
Energy Efficient and Secure Wireless Sensor Networks Design.
-
Creator
-
Attiah, Afraa, Zou, Changchun, Chatterjee, Mainak, Wang, Jun, Yuksel, Murat, Wang, Chung-Ching, University of Central Florida
-
Abstract / Description
-
ABSTRACTWireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense,process, communicate, and transmit information to a destination, and they are expected to have significantimpact on the efficiency of many applications in various fields. The resource constraintsuch as limited battery power, is the greatest challenge in WSNs design as it affects the lifetimeand performance of the network. An energy efficient, secure, and trustworthy system is vital whena WSN...
Show moreABSTRACTWireless Sensor Networks (WSNs) are emerging technologies that have the ability to sense,process, communicate, and transmit information to a destination, and they are expected to have significantimpact on the efficiency of many applications in various fields. The resource constraintsuch as limited battery power, is the greatest challenge in WSNs design as it affects the lifetimeand performance of the network. An energy efficient, secure, and trustworthy system is vital whena WSN involves highly sensitive information. Thus, it is critical to design mechanisms that are energyefficient and secure while at the same time maintaining the desired level of quality of service.Inspired by these challenges, this dissertation is dedicated to exploiting optimization and gametheoretic approaches/solutions to handle several important issues in WSN communication, includingenergy efficiency, latency, congestion, dynamic traffic load, and security. We present severalnovel mechanisms to improve the security and energy efficiency of WSNs. Two new schemes areproposed for the network layer stack to achieve the following: (a) to enhance energy efficiencythrough optimized sleep intervals, that also considers the underlying dynamic traffic load and (b)to develop the routing protocol in order to handle wasted energy, congestion, and clustering. Wealso propose efficient routing and energy-efficient clustering algorithms based on optimization andgame theory. Furthermore, we propose a dynamic game theoretic framework (i.e., hyper defense)to analyze the interactions between attacker and defender as a non-cooperative security game thatconsiders the resource limitation. All the proposed schemes are validated by extensive experimentalanalyses, obtained by running simulations depicting various situations in WSNs in orderto represent real-world scenarios as realistically as possible. The results show that the proposedschemes achieve high performance in different terms, such as network lifetime, compared with thestate-of-the-art schemes.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0006971, ucf:51672
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006971
-
-
Title
-
MODELING, DESIGN AND EVALUATION OF NETWORKING SYSTEMS AND PROTOCOLS THROUGH SIMULATION.
-
Creator
-
Lacks, Daniel, Kocak, Taskin, University of Central Florida
-
Abstract / Description
-
Computer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework...
Show moreComputer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework that can be used to create new networking simulators on top of an HLA-based federation for distributed simulation. The goals are to model and simulate networking architectures and protocols by developing a common underlying simulation infrastructure and to reduce the time a developer has to learn the semantics of message passing and time management to free more time for experimentation and data collection and reporting. This is accomplished by evolving the simulation engine through three different applications that model three different types of network protocols. Computer networking is a good candidate for simulation because of the Internet's rapid growth that has spawned off the need for new protocols and algorithms and the desire for a common infrastructure to model these protocols and algorithms. One simulation, the 3DInterconnect simulator, simulates data transmitting through a hardware k-array n-cube network interconnect. Performance results show that k-array n-cube topologies can sustain higher traffic load than the currently used interconnects. The second simulator, Cluster Leader Logic Algorithm Simulator, simulates an ad-hoc wireless routing protocol that uses a data distribution methodology based on the GPS-QHRA routing protocol. CLL algorithm can realize a maximum of 45% power savings and maximum 25% reduced queuing delay compared to GPS-QHRA. The third simulator simulates a grid resource discovery protocol for helping Virtual Organizations to find resource on a grid network to compute or store data on. Results show that worst-case 99.43% of the discovery messages are able to find a resource provider to use for computation. The simulation engine was then built to perform basic HLA operations. Results show successful HLA functions including creating, joining, and resigning from a federation, time management, and event publication and subscription.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001887, ucf:47399
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001887
-
-
Title
-
Virtual Router Approach for Wireless Ad Hoc Networks.
-
Creator
-
Ho, Ai, Hua, Kien, Guha, Ratan, Moshell, Jack, Zou, Changchun, Wang, Ching, University of Central Florida
-
Abstract / Description
-
Wireless networks have become increasingly popular in recent years. There are two variations of mobile wireless networks: infrastructure mobile networks and infrastructureless mobile networks. The latter are also known as mobile ad hoc network (MANET). MANETs have no fixed routers. Instead, mobile nodes function as relay nodes or routers, which discover and maintain communication connections between source nodes and destination nodes for various data transmission sessions. In other words, an...
Show moreWireless networks have become increasingly popular in recent years. There are two variations of mobile wireless networks: infrastructure mobile networks and infrastructureless mobile networks. The latter are also known as mobile ad hoc network (MANET). MANETs have no fixed routers. Instead, mobile nodes function as relay nodes or routers, which discover and maintain communication connections between source nodes and destination nodes for various data transmission sessions. In other words, an MANET is a self-organizing multi-hop wireless network in which all nodes within a given geographical area participate in the routing and data forwarding process. Such networks are scalable and self-healing. They support mobile applications where an infrastructure is either not available (e.g., rescue operations and underground networks) or not desirable (e.g., harsh industrial environments).In many ad hoc networks such as vehicular networks, links among nodes change constantly and rapidly due to high node speed. Maintaining communication links of an established communication path that extends between source and destination nodes is a significant challenge in mobile ad hoc networks due to movement of the mobile nodes. In particular, such communication links are often broken under a high mobility environment. Communication links can also be broken by obstacles such as buildings in a street environment that block radio signal. In a street environment, obstacles and fast moving nodes result in a very short window of communication between nodes on different streets. Although a new communication route can be established when a break in the communication path occurs, repeatedly reestablishing new routes incurs delay and substantial overhead. To address this limitation, we introduce the Virtual Router abstraction in this dissertation. A virtual router is a dynamically-created logical router that is associated with a particular geographical area. Its routing functionality is provided by the physical nodes (i.e., mobile devices) currently within the geographical region served by the virtual router. These physical nodes take turns in forwarding data packets for the virtual router. In this environment, data packets are transmitted from a source node to a destination node over a series of virtual routers. Since virtual routers do not move, this scheme is much less susceptible to node mobility. There can be two virtual router approaches: Static Virtual Router (SVR) and Dynamic Virtual Router (DVR). In SVR, the virtual routers are predetermined and shared by all communication sessions over time. This scheme requires each mobile node to have a map of the virtual routers, and use a global positioning system (GPS) to determine if the node is within the geographical region of a given router. DVR is different from SVR with the following distinctions: (1) virtual routers are dynamically created for each communication sessions as needed, and deprecated after their use; (2) mobile nodes do not need to have a GPS; and (3) mobile nodes do not need to know whereabouts of the virtual routers.In this dissertation, we apply Virtual Router approach to address mobility challenges in routing data. We first propose a data routing protocol that uses SVR to overcome the extreme fast topology change in a street environment. We then propose a routing protocol that does not require node locations by adapting a DVR approach. We also explore how the Virtual Router Approach can reduce the overhead associated with initial route or location requests used by many existing routing protocols to find a destination. An initial request for a destination is expensive because all the nodes need to be reached to locate the destination. We propose two broadcast protocols; one in an open terrain environment and the other in a street environment. Both broadcast protocols apply SVR. We provide simulation results to demonstrate the effectiveness of the proposed protocols in handling high mobility. They show Virtual Router approach can achieve several times better performance than traditional routing and broadcast approach based on physical routers (i.e., relay nodes).
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0004119, ucf:49090
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004119
-
-
Title
-
MODELING, DESIGN AND FABRICATION OF ORTHOGONAL AND PSUEDO-ORTHOGONAL FREQUENCY CODED SAW WIRELESS SPREAD SPECTRUM RFID SENSOR TAGS.
-
Creator
-
Saldanha, Nancy, Malcoha, Donald, University of Central Florida
-
Abstract / Description
-
Surface acoustic wave (SAW) sensors offer a wireless, passive sensor solution for use in numerous environments where wired sensing can be expensive and infeasible. Single carrier frequency SAW sensor embodiments such as delay lines, and resonators have been used in single sensor environments where sensor identification is not a necessity. The orthogonal frequency coded (OFC) SAW sensor tag embodiment developed at UCF uses a spread spectrum approach that allows interrogation in a multi-sensor...
Show moreSurface acoustic wave (SAW) sensors offer a wireless, passive sensor solution for use in numerous environments where wired sensing can be expensive and infeasible. Single carrier frequency SAW sensor embodiments such as delay lines, and resonators have been used in single sensor environments where sensor identification is not a necessity. The orthogonal frequency coded (OFC) SAW sensor tag embodiment developed at UCF uses a spread spectrum approach that allows interrogation in a multi-sensor environment and provides simultaneous sensing and sensor identification. The SAW device is encoded via proper design of multiple Bragg reflectors at differing frequencies. To enable accurate device design, a model to predict reflectivity over a wide range of electrode metallization ratios and metal thicknesses has been developed and implemented in a coupling of modes (COM) model. The high coupling coefficient, reflectivity and temperature coefficient of delay (TCD) of YZ LiNbO3 makes it an ideal substrate material for a temperature sensor, and the reflectivity model has been developed and verified for this substrate. A new concept of pseudo-orthogonal frequency coded (POFC) SAW sensor tags has been investigated, and with proper design, the POFC SAW reduces device insertion loss and fractional bandwidth compared to OFC. OFC and POFC sensor devices have been fabricated at 250 MHz and 915 MHz using fundamental operation, and 500 MHz and 1.6 GHz using second harmonic operation. Measured device results are shown and compared with the COM simulations using the enhanced reflectivity model. Additionally, the first OFC devices at 1.05 GHz were fabricated on 128o YX LiNbO3 to explore feasibility of the material for future use in OFC sensor applications. Devices at 915 MHz have been fabricated on YZ LiNbO3 and integrated with an antenna, and have then been used in a transceiver system built by Mnemonics, Inc. to wirelessly sense temperature. The first experimental wireless POFC SAW sensor device results and predictions will be presented.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003594, ucf:48888
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003594
-
-
Title
-
Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore.
-
Creator
-
Tortorelli, Brian, Cabrera, Cheryl, Lindgren, Robb, Reedy, Robert, University of Central Florida
-
Abstract / Description
-
This project expands the outreach of the Canaveral National Seashore to its visitors, potential visitors, and virtual visitors through its goals in conservancy and preservation of its natural resources. This paper is involved with the current iteration of a series of digital media projects, the Sea Turtle Nest Camera, also known as, Turtle Cam. It details how and why this project was designed to be an ongoing initiative to assist in those goals.
-
Date Issued
-
2012
-
Identifier
-
CFE0004330, ucf:49446
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004330
-
-
Title
-
Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks.
-
Creator
-
Bhattacharjee, Shameek, Chatterjee, Mainak, Guha, Ratan, Zou, Changchun, Turgut, Damla, Catbas, Necati, University of Central Florida
-
Abstract / Description
-
Dynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors...
Show moreDynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors due to wireless channel characteristics. Suchdependence on cooperative spectrum sensing is vulnerable to attacks such as SecondarySpectrum Data Falsification (SSDF) attacks when multiple malicious or selfish radios falsifythe spectrum reports. Hence, there is a need to quantify the trustworthiness of radios thatshare spectrum sensing reports and devise malicious node identification and robust fusionschemes that would lead to correct inference about spectrum usage.In this work, we propose an anomaly monitoring technique that can effectively cap-ture anomalies in the spectrum sensing reports shared by individual cognitive radios duringcooperative spectrum sensing in a multi-channel distributed network. Such anomalies areused as evidence to compute the trustworthiness of a radio by its neighbours. The proposedanomaly monitoring technique works for any density of malicious nodes and for any physicalenvironment. We propose an optimistic trust heuristic for a system with a normal risk attitude and show that it can be approximated as a beta distribution. For a more conservativesystem, we propose a multinomial Dirichlet distribution based conservative trust framework,where Josang's Belief model is used to resolve any uncertainty in information that mightarise during anomaly monitoring. Using a machine learning approach, we identify maliciousnodes with a high degree of certainty regardless of their aggressiveness and variations intro-duced by the pathloss environment. We also propose extensions to the anomaly monitoringtechnique that facilitate learning about strategies employed by malicious nodes and alsoutilize the misleading information they provide. We also devise strategies to defend against a collaborative SSDF attack that islaunched by a coalition of selfish nodes. Since, defense against such collaborative attacks isdifficult with popularly used voting based inference models or node centric isolation techniques, we propose a channel centric Bayesian inference approach that indicates how much the collective decision on a channels occupancy inference can be trusted. Based on the measured observations over time, we estimate the parameters of the hypothesis of anomalous andnon-anomalous events using a multinomial Bayesian based inference. We quantitatively define the trustworthiness of a channel inference as the difference between the posterior beliefsassociated with anomalous and non-anomalous events. The posterior beliefs are updated based on a weighted average of the prior information on the belief itself and the recently observed data.Subsequently, we propose robust fusion models which utilize the trusts of the nodes to improve the accuracy of the cooperative spectrum sensing decisions. In particular, we propose three fusion models: (i) optimistic trust based fusion, (ii) conservative trust based fusion, and (iii) inversion based fusion. The former two approaches exclude untrustworthy sensing reports for fusion, while the last approach utilizes misleading information. Allschemes are analyzed under various attack strategies. We propose an asymmetric weightedmoving average based trust management scheme that quickly identifies on-off SSDF attacks and prevents quick trust redemption when such nodes revert back to temporal honest behavior. We also provide insights on what attack strategies are more effective from the adversaries' perspective.Through extensive simulation experiments we show that the trust models are effective in identifying malicious nodes with a high degree of certainty under variety of network and radio conditions. We show high true negative detection rates even when multiple malicious nodes launch collaborative attacks which is an improvement over existing voting based exclusion and entropy divergence techniques. We also show that we are able to improve the accuracy of fusion decisions compared to other popular fusion techniques. Trust based fusion schemes show worst case decision error rates of 5% while inversion based fusion show 4% as opposed majority voting schemes that have 18% error rate. We also show that the proposed channel centric Bayesian inference based trust model is able to distinguish between attacked and non-attacked channels for both static and dynamic collaborative attacks. We are also able to show that attacked channels have significantly lower trust values than channels that are not(-) a metric that can be used by nodes to rank the quality of inference on channels.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005764, ucf:50081
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005764
-
-
Title
-
Scalable Map Information Dissemination for Connected and Automated Vehicle Systems.
-
Creator
-
Gani, S M Osman, Pourmohammadi Fallah, Yaser, Vosoughi, Azadeh, Yuksel, Murat, Chatterjee, Mainak, Hasan, Samiul, University of Central Florida
-
Abstract / Description
-
Situational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle...
Show moreSituational awareness in connected and automated vehicle (CAV) systems becomes particularly challenging in the presence of non-line of sight objects and/or objects beyond the sensing range of local onboard sensors. Despite the fact that fully autonomous driving requires the use of multiple redundant sensor systems, primarily including camera, radar, and LiDAR, the non-line of sight object detection problem still persists due to the inherent limitations of those sensing techniques. To tackle this challenge, the inter-vehicle communication system is envisioned that allows vehicles to exchange self-status updates aiming to extend their effective field of view and thus compensate for the limitations of the vehicle tracking subsystem that relies substantially on onboard sensing devices. Tracking capability in such systems can be further improved through the cooperative sharing of locally created map data instead of transmitting only self-update messages containing core basic safety message (BSM) data. In the cooperative sharing of safety messages, it is imperative to have a scalable communication protocol to ensure optimal use of the communication channel. This dissertation contributes to the analysis of the scalability issue in vehicle-to-everything (V2X) communication and then addresses the range issue of situational awareness in CAV systems by proposing a content-adaptive V2X communication architecture. To that end, we first analyze the BSM scheduling protocol standardized in the SAE J2945/1 and present large-scale scalability results obtained from a high-fidelity simulation platform to demonstrate the protocol's efficacy to address the scalability issues in V2X communication. By employing a distributed opportunistic approach, the SAE J2945/1 congestion control algorithm keeps the overall offered channel load within an optimal operating range, while meeting the minimum tracking requirements set forth by upper-layer applications. This scheduling protocol allows event-triggered and vehicle-dynamics driven message transmits that further the situational awareness in a cooperative V2X context. Presented validation results of the congestion control algorithm include position tracking errors as the performance measure, with the age of communicated information as the evaluation measure. In addition, we examine the optimality of the default settings of the congestion control parameters. Comprehensive analysis and trade-off study of the control parameters reveal some areas of improvement to further the algorithm's efficacy. Motivated by the effectiveness of channel congestion control mechanism, we further investigate message content and length adaptations, together with transmit rate control. Reasonably, the content of the exchanged information has a significant impact on the map accuracy in cooperative driving systems. We investigate different content control schemes for a communication architecture aimed at map sharing and evaluate their performance in terms of position tracking error. This dissertation determines that message content should be concentrated to mapped objects that are located farther away from the sender to the edge of the local sensor range. This dissertation also finds that optimized combination of message length and transmit rate ensures the optimal channel utilization for cooperative vehicular communication, which in turn improves the situational awareness of the whole system.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007634, ucf:52470
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007634
Pages