The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work considers the use of obfuscation against a global eavesdropper in a resource-constrained environment. We assume a network where network traffic (queries) is not always present on the network but is stochastic in nature. Even if the traffic is encrypted and the payload of packets are secure, under the threat of a passive adversary, activity over the links might be subjected to traffic analysis...
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations...
We study distributed editing of network topologies from a game theoretic perspective. The nodes are the agents/players in the game and the editing decisions of each node are to add a new link to another node, remove an existing link, or maintain it. The aim of each node is to achieve a balance between the network property reward and the editing costs for changing and maintaining one's neighborhood...
We study the problem of network topology design within a sequence of policy-compliant topologies as a game between a designer and an adversary. At any time instant, the designer aims to operate the network in an optimal topology within this policy compliant sequence with respect to a desired network property. Simultaneously, the adversary counters the designer trying to force operation in a suboptimal...
Quality of Information (QoI) provides a context-dependent measure of the utility that a network delivers to its users by incorporating non-traditional information attributes. Quickly and easily predicting performance and limitations of a network using QoI metrics is a valuable tool for network design. Even more useful is an understanding of how network components like topology, bandwidth, protocols,...
We consider a problem of topology design and control when some of the links may become unavailable. When a network operates in a contested environment, the operator may wish to alter the network topology to enhance robustness. This may come at the expense of operational costs. We consider a dynamic programming framework where the goal is to minimize time average costs, where costs are the sum of network...
Mobile micro-clouds (MMCs), which are small cloud-like infrastructures that can host services for mobile users, provide a promising approach to deliver data and computation to users in low bandwidth/high latency networks. In this work, we take a step towards security-aware service migration for multiple servers for MMC in tactical environments. As a fundamental model, we consider two users sharing...
Backpressure Routing is a cross-layer control algorithm that makes decisions on routing and resource allocation in mobile ad hoc networks using network state information like queue backlog values and current available channel rates. While it is desirable because of its provable performance guarantees, including providing optimal throughput, the real world problem of implementing backpressure routing...
In many deployments of wireless sensor networks (WSNs), the primary goal is to collect and deliver data from many nodes to a data sink. This goal must be met while considering limited resources, such as battery life, in the wireless nodes. In this work, we propose considering the content of generated data to make intelligent data and node selection decisions. We formally present the problem of maximizing...
The freedom and flexibility of wireless Mobile Adhoc Networks (MANETs) that make them extremely desirable for many military, emergency, and sensor network applications also present challenges for multiple layers in the network stack. Max-weight scheduling, also known as backpressure routing, is a cross-layer control algorithm that is well-known to be throughput optimal since it provides queue stability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.