Many of today's organizations have set up wireless networks for company use, some merely for the convenience of not having wires everywhere. In addition, many of these networks are using a hardware implementation ...
详细信息
ISBN:
(纸本)1565553144
Many of today's organizations have set up wireless networks for company use, some merely for the convenience of not having wires everywhere. In addition, many of these networks are using a hardware implementation of the IEEE 802.11 Wired Equivalent Privacy protocol (WEP) for security. With the known vulnerabilities in WEP, these organizations are faced with either a costly hardware upgrade or just ignoring the vulnerabilities. However, the Synchronized Pseudo Random Number Generation protocol (SPRiNG) is a proposed solution to securing wireless communication designed to work with existing WEP enabled hardware devices. Replacing networking components with hardware that implements other security measures such as the Wi-Fi Protected Access protocol (WPA) can be very costly. Therefore, a solution such as SPRiNG that can be implemented with a software or a firmware upgrade on existing WEP enabled hardware is desirable. Using simulation, this paper provides a performance analysis of the SPRiNG protocol's increased overhead. We determine that SPRiNG will perform acceptably with up to 20% more than normal network loss.
Auburn University, through the Army's Aviation and Missile Research, Development and engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative program. The research program at Auburn is focus...
详细信息
ISBN:
(纸本)9781622761449
Auburn University, through the Army's Aviation and Missile Research, Development and engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative program. The research program at Auburn is focused on designing new wireless systems to support UAV air and ground communications. Network simulation has been a key component of our research program. Specifically we have been working in three areas: - Use of commercial wireless technologies to provide secure, realtime video communication between UAV ground elements. - Assessment and evaluation of appropriate wireless security measures. - Development of a high fidelity modeling and simulation testbed to support the USI program. This paper will address the verification and validation of the simulation test bed. Comparisons of predicted simulation results against actual field testing will be discussed. Most importantly, we will address the challenges associated with high fidelity network simulation of NSA Type 1 crypto, video traffic and emerging COTS wireless protocols.
Auburn University, through the Army's Aviation and Missile Research, Development and engineering Center (AMRDEC) has been supporting the Unmanned Systems Initiative (USI) program in three research areas related to...
详细信息
Mobility management is an important issue for publish/subscribe systems to support mobile clients. The objectives of mobility management for publish / subscribe are to achieve short handoff delay and low message overh...
详细信息
Within Semantic Web environments, ontologies have been adopted as their conceptual backbone. An important task for Web information integration and sharing is to resolve semantic conflicts because of semantic heterogen...
详细信息
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signa...
详细信息
As a service-based language, WS-BPEL is widely adopted into enterprise solutions. However, because of the intrinsic flexibility and dynamism of the web services it used, its behavior couldn't be foreseen until it ...
详细信息
As a service-based language, WS-BPEL is widely adopted into enterprise solutions. However, because of the intrinsic flexibility and dynamism of the web services it used, its behavior couldn't be foreseen until it is running, runtime monitoring is needed. The paper introduces an approach of dynamic monitoring of WS-BPEL processes. It uses Past Linear Temporal Language (PLTL) to describe monitor rules, with the support of Aspect Oriented Programming (AOP). This approach, which has been implemented on OnceBPEL, a BPEL engine designed by ISCAS, can be applied to runtime monitoring of WS-BPEL processes effectively.
Being an important means of reducing development costs, behavior specification of software components facilitates reuse of a component and even reuse of a component's architecture (assembly). However, since typica...
详细信息
Auburn University, through the Army's aviation and missile research, development and engineering center (AMRDEC) has been supporting the unmanned systems initiative (USI) program in three research areas related to...
详细信息
Auburn University, through the Army's aviation and missile research, development and engineering center (AMRDEC) has been supporting the unmanned systems initiative (USI) program in three research areas related to unmanned aerial vehicle (UAV). A major element in this work is the development of a high fidelity modeling and simulation testbed to support the USI program. This paper describes the testbed and the verification and validation of the testbed.
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere...
详细信息
暂无评论