The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Side-Channel communication is a form of traffic in which malicious parties communicate secretly over a wireless network. This is often established through the modification of Ethernet frame header fields, such as the Frame Check Sequence (FCS). The FCS is responsible for determining whether or not a frame has been corrupted in transmission, and contains a value calculated through the use of a predetermined...
In this paper we model the data traffic congestion scenario in a vehicular ad-hoc network, and we apply the Adaptive PI Rate Controller (APIRATE) to deal with the congestion. Derived from classical control theory, the APIRATE controller performs AQM (Active Queue Management) by controlling the source rate based on the instantaneous queue length of the congested node. We then study the performance...
Vehicle traffic congestion is reflected as delays while traveling. Traffic congestion has a number of negative effects and is a major problem in today's society. Several techniques have been deployed to deal with this problem. In this paper, we have proposed an innovative approach to deal with the problem of traffic congestion using the characteristics of vehicular ad-hoc networks (VANET). We have...
In this paper, we establish a hidden 802.11 wireless channel, with the masking of the channel achieved by inserting intentional errors in the frame check sequence (FCS). We design a frame handler module to provide a proof-of-concept model of the side-channel using MATLAB and Simulink with communication toolbox. We justify using MATLAB over the other simulation tools because of its existing functions:...
The ability to provide various application services introduces more traffic and therefore the problem of data traffic congestion in a VANET (Vehicular Ad-Hoc Network), and hence the QoS (Quality of Service) of the application deteriorates. This paper studies an adaptive PI rate-controller to improve/restore the QoS. The controller controls the source sending rate based on the instantaneous queue length...
Contextual information plays an important role in hiding technological complexities from a user's point of view in ubiquitous and pervasive environments. In terms of access control, contextual information can be used to minimize the set up and access control complexities and at the same time to allow users to gain access to resources pervasively without difficulties. RBAC has been used and adopted...
Vehicular ad-hoc networks (VANET) are a mobile adhoc networking technology to facilitate vehicle-to-vehicle and vehicle-to-roadside communication. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbors and other vehicles in the network. As in a mobile ad-hoc network (MANET) it is necessary to identify or address each vehicle in the vehicular ad-hoc...
Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level...
The DSRC standard gives the provision to process messages in XML format instead of the default binary encoding scheme. Although, use of XML encoding provides flexibility, it also introduces bandwidth communication overhead since the message size will increase and end to end communication delay since processing time will also increase. There are many proposed XML compression algorithms to decrease...
In this paper, we present our work towards the development and evaluation of an ontology for searching distributed and heterogeneous sensor networks data. In particular, we propose a two layer prototype ontology that utilizes the IEEE Suggested Upper Merged Ontology (SUMO) as a root definition of general concepts and associations and two sub- ontologies: the sensor data sub-ontology and the sensor...
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scenarios. Coalition access control encompasses control mechanisms dealing with access between multiple heterogeneous entities from different security domains. For pervasive computing these coalitions are formed in an ad hoc...
We have implemented a fully-functional wormhole attack in an IPv6 802.11b wireless mobile ad hoc network (MANET) test bed running a proactive routing protocol. Using customised analysis tools we study the traffic collected from the MANET at three different stages: i) regular operation, ii) with a "benign" wormhole joining distant parts of the network, and iii) under stress from wormhole...
The following paper provides an architectural proposal and integrate common Web-services methodologies (XML based messaging, XML based transformation tools, Web-service tools and platforms) in order to facilitate the development of a Web-services based 1451.1 NCAP information model. A distinct separation exists within the 1451.1 NCAP model based on an internal service structure (characterized as internal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.