Liverpool John Moores University

Displaying 1-40 of 100 results

  • White Papers // Jun 2013

    Secure Cloud Computing for Critical Infrastructure: A Survey

    Cloud computing has been considered as one of the promising solutions to the authors' increasing demand for accessing and using resources provisioned over the Internet. It offers powerful processing and storage resources as on-demand services with reduce cost, and increase efficiency and performance. All of these features and more encourage...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2013

    Mobile Devices: In-Network Anti-Malware Analysis

    Mobile devices are becoming integrated with appliances in the people homes, with ever present sensors, actuators and network capabilities new threats are surfacing that interfere with user's possessions, well-being and privacy in the growing Internet of Things. The most familiar type of device in this evolution of technology is the...

    Provided By Liverpool John Moores University

  • White Papers // Aug 2012

    High Performance OFDM Systems for Digital Video Broadcasting-Terrestrial (DVB-T)

    Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, such as cellular video conferencing. Digital Video Broadcasting-Terrestrial-Second generation (DVB-T2) has been demonstrated to provide services with very high spectral efficiency and...

    Provided By Liverpool John Moores University

  • White Papers // Jul 2012

    Extending AOP Principles for the Description of Network Security Patterns

    Aspect oriented programming is increasingly being used for the practical coding of cross-cutting concerns woven throughout an application. However, most existing AOP point-cut definition languages don't distinguish in their application between different systems across a network. For network security there is a need to apply different aspects depending on the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Enhancing Security of Data and Their Related Processing in Cloud Computing

    Cloud computing is attracting huge attention from both the academic and commercial fields thanks to its provision of vast amounts of shared computing resources for Internet users. However, moving private or sensitive data and their related processing into clouds while offering data owners no physical and only limited digital control...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Ad-Hoc Cloud Networks: A Probabilistic Model for Vulnerability Detection in Critical Infrastructure Using Bayesian Networks

    The use of sensor nodes in the authors' society is becoming more ubiquitous and also looks to expand more in the nearest future. This is because most recent technological devices are now having inbuilt wireless sensor nodes which lead to different questions of how these devices' capabilities could support heterogeneous...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Energy Efficient Clustering Approach for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Spectrum sensing is the key element in cognitive radio networks for detecting the primary users. Due to the destructive conditions of sensing channel such as multipath fading and shadowing, local sensing is not fitting the requirements for reliable detection. Therefore, cooperative spectrum sensing is introduced to detect the primary user...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    A Survey of Trust Management in Mobile Ad-Hoc Networks

    Distributed ad-hoc networks with no centralised node of command such as MANETs offer an interesting challenge in establishing trust between nodes for the purposes of network security. As a subjective measure of belief for behaviour; trust values can be calculated and propagated between each node to promote confidence between cooperating...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Unified Architecture for Video Delivery Over the Internet

    Since 1994 when ABC's "World News Now," was first broadcast across the Internet, multimedia dissemination has evolved along distinct and unique paths, resulting in two distribution methods that are commonly used across today's Internet, namely Over-The-Top TeleVision (OTT-TV) and Internet Protocol TeleVision (IPTV). With an increasing amount of video content...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reducing Cost and Contention of P2P Live Streaming Through Locality and Piece Selection

    The use of locality within Peer-To-Peer (P2P) networks is ensuring the construction of overlay networks that are both economically viable for network operators and scalable. However, the underlying protocols on which traditional P2P overlays are based rapidly have to evolve in order to better support more time sensitive, real-time video...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Memory Threads: Organizing Digital Memories to Organize Social P2P Networks

    Human remember their memories based on some reference which helps in recalling those memories. These references are usually common for many people, objects, places and so on. The authors organize human digital memories in the form of memory threads, according to the references of the memories in order to present...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Geographic QoS Peer-to-Peer Streaming Framework, for High-Quality Transmission of Multimedia Content over Wireless Mesh Networks in Disaster Recovery Scenarios

    The use of mobile devices capable of wireless communications such as mobile phones, PDAs, and laptops in disaster recovery has been an important research topic for several years. However, while the majority of previous research has focused on voice and data communications a small number of researchers have proposed the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System Monitoring for Digital Forensic Investigation

    System monitoring provides a useful pre-emptive solution to the problem of gathering information about how a system behaves at run-time for post-hoc analysis by system administrators and forensic experts. However, existing techniques are insufficient to support post-hoc event reconstruction in large-scale systems. The authors propose a distributed trace-based system monitor...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Speeding and Efficiency Increasing of Color Biometric Finger Print Identification Using Particle Swarm Optimization Based On Selected Feature by Multiwavelet

    Biometric FingerPrint Identification (BFPI) by Feature Selection (FS) is a global optimization problem in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable recognition accuracy. It is the most important step that affects the performance of a pattern recognition system. This...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Towards a Framework for Operational Support in Critical Infrastructures

    Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing, government services and in some cases people. The consequences of an attack on one of these would result in loss of life, economic damage or a devastating effect on the operation of government services and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Robust Digital Image Watermarking Using Region Adaptive Embedding Technique

    Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper, the authors propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Fundamental Analysis of Hybrid Free Space Optical and Radio Frequency Communication Systems

    Free-Space Optical (FSO) communication systems have been identified as a complementary solution to resolve the existing "Last mile" problems. Nevertheless, the inherent susceptibility of this technology option to various adverse atmospheric conditions has initiated research interests in hybrid FSO and Radio Frequency (RF) systems. In this paper, the authors investigate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Efficient Bandwidth Measurements of Thin Film Filters for Next-Generation Optical Access

    The authors have measured differential group delay of thin film filters devices with 200 GHz and 100 GHz full width half maximum bandwidth employing method based on Jones Matrix Eigen-analysis and have evaluated efficient bandwidth of thin film filters devices utilizing 2.5 Gbit/s and 10.3125 Gbit/s optical signals to draw...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Connectivity Dynamics Under Microscopic Parameters in Signalized Heterogeneous Traffic Flow for VANET

    The issue of connectivity in Vehicular Ad-hoc NETwork (VANET) is influenced by the diverse characteristics of traffic flow on the road. The authors have applied fluid dynamic model and captured the connectivity dynamics considering microscopic aspects in heterogeneous traffic flow in a signalized urban road environment. The applied model incorporates...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Systematic Study of the Behaviour of the PMEPR in Relation to OFDM Design Parameters

    The design of systems with enhanced Quality of Service (QoS) and improved power efficiency has evolved into an intensive research area in wired and wireless communications engineering. Orthogonal Frequency Division Multiplexing (OFDM) has been proven to have the potential to achieve high data rates, adapt to severe channel conditions and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reputation-Based Non-Cooperative Auction Game Competitive for Spectrum Sharing in Cognitive Radio Networks

    Cognitive radio is a novel technique to improve utilization efficiently of the radio spectrum. In this paper, the authors consider the problem sharing among a primary user and a group of secondary users. This problem is formulated on sealed-bid auction, in which each secondary user with high reputation can share...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Iterative Coloring Technique for the Generation of Correlated Rayleigh Fading Envelopes for Multi-Antenna and Multicarrier Systems

    In this paper, a simple technique is proposed for the generation of equal power correlated Rayleigh fading envelopes for multi-antenna and multicarrier systems with any desired correlation factors. It employs iterative coloring of uncorrelated reference envelopes using real correlation matrix of envelopes rather than complex covariance matrix of the Gaussian...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    CIA Security Management for Wireless Sensor Network Nodes

    Wireless Sensor Networks (WSN) have become a complete solution in making use of low power implementation and embedded systems. Nevertheless, the many constraints arising from low communication range, limited computing power, lack of availability of networking protocol, programming in the absence of certainty and security lapses in the areas of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Identity-Based Attacks Against Reputation-Based Systems in MANETs

    In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, credit and trust based schemes have been developed to enforce cooperation and discourage node misbehaviour. These models are vulnerable to two types of attack. First, a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    This paper addresses the problem of secure path key establishment in WSN using a key pre-distribution scheme. In this paper, first the authors have proposed a symmetric key generation scheme using Maximum Rank Distance(MRD) codes and then they have proposed a path establishment algorithm. Their scheme not only substantially improves...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Framework for Providing a Secure System of Systems Composition

    The area of System of Systems research is focused on using multiple complex and disparate systems to provide goal orientated solution that provides functionality greater than its component parts. The paper highlights some of the authors' research into the area of System of Systems (SoS) and their security and composition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Link Quality Based Ant Routing Algorithm for MANETs (LQARA)

    The used routing algorithms for Mobile Ad hoc NETworks (MANETs) are inherited from the conventional ones which makes them subject of numerous criticisms since they do not take into consideration all the characteristics of ad hoc networks such as mobility and medium constraints. In this paper, the authors propose a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks

    To improve spectrum efficiency, Cognitive Radio (CR) is designed to allow unlicensed (secondary) users to utilize the licensed spectrum when it is not used by the licensed (primary) users. Because of the dynamic nature of cognitive radio network, the resource allocation targeting at best system performance becomes more and more...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Cognitive Attributes in a Mobile Ad-Hoc Network

    This paper presents an initial investigation into the feasibility of improving end-to-end delay or better meeting mission objectives in a Mobile Ad-hoc NETwork (MANET) environment by applying existing methodologies that have been proposed in Cognitive Networks (CNs). MANETs are networks without a predefined infrastructure with very limited resources as opposed...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing a Protocol to Support Multicast Mobility in IPv6 Network

    In this paper, the authors describe a new extended protocol framework for IPv6 WiFi networks, which handle multicast services whilst changing the WiFi zone within a wireless network. They modify the Mobile IPv6 function to support their framework and use ICMPv6 to maintain the multicast connection route. In addition, they...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Current Threats to Security in Campus Networks

    Campus networks are vulnerable to a number of security threats, including physical threats, system vulnerabilities, malicious programs, and identification issues. Wireless technology is developing at an extremely fast rate. The majority of campuses use wireless access points due to the numerous advantages that wireless networks can offer. Hacking is a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Adaptive Learning and Reconfiguration in Wireless Sensor Actuator Networks for Control Applications

    WSANs are becoming a solution for implementation of control applications. Sensors and actuators can be deployed forming a large or dense network to monitor and control physical parameters or systems. Reliable data transmission and real time constraints are the most significant challenges in WSAN implementation for control applications in addition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing Smart Middleware for Wireless Sensor Networks

    Middleware for Wireless Sensor Networks (WSN) act as the interface point between Wireless Sensor Nodes and higher application layers. A middleware can introduce, support and enhance access to the underlying networks in intelligent ways. Abstraction from the lower sensor layers, Information Processing and Service Provisioning for higher applications are the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Design Considerations for a Self-Managed Wireless Sensor Cloud for Emergency Response Scenario

    Wireless Sensor Networks (WSNs) have become widely used in various applications areas including environmental monitoring, surveillance and military applications. As the complexity of WSNs increase and the application areas in which they are used become more critical, the requirement of such networks to be self managing becomes necessary. Various aspects...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Secure Service Composition for P2P Home Networked Appliances

    Advances in multimedia applications, services and intelligent networked appliances have been making ubiquitous home environments a reality. The authors have been using computer-based devices in the people daily lives ranging from home appliances such as TVs, PCs, and Audio/Video devices to office appliances such as PDAs, and printers. Network Appliances...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Security Practices in Cloud Computing and the Implications to SMEs

    This paper examines the implications of small businesses that are turning to cloud technology in order to mitigate their Capital Expenditure (Capex) in terms of IT costs, it will also report on the security mechanisms used by Cloud providers. The paper briefly looks at security issues in terms of compliance,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Measuring Trust of Components in Web Services

    Trust is a vast and subjective field that has been researched in areas such as spam, peer-to-peer networks and web services. However, very little research has been done into web service collaboration and how trust related metrics are propagated down to the component layers. Trust has the same core requirements;...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Forensic Analysis of Distributed Service Oriented Computing Platforms

    Cloud computing is quickly becoming pervasive. Millions of concurrent users are taking advantage of the flexibility offered by cloud computing platforms. The use of the large scale global storage provided by cloud computing presents a barrier to existing digital forensic techniques which were developed to target single hosts containing a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Pre-Authentication and Selection of Suitable Target Base Station During Handover Procedure in Mobile WiMAX Network

    WiMAX (Worldwide Interoperability for Microwave Access) is an emerging technology that can provide wireless broadband access at the data rates of 70 Mbps over 50 kilometres to both home and business customers. WiMAX is cost effective and offers higher data rates than other wireless networks. It supports both fixed and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Simulation Based Study of Energy Efficient Packet Size Estimation for Ad-hoc Networks

    This paper addressed the energy efficient optimal packet size of ad-hoc networks. Adopting the optimal packet size not only reduces the packet error rate but also balance the packet header/trailer overhead. Hence, the number of packets drop is reduced and efficiency level is increased. Comparing to other similar efforts the...

    Provided By Liverpool John Moores University

  • White Papers // Nov 2010

    A Self-Managing Fault Management Mechanism for Wireless Sensor Networks

    A sensor network can be described as a collection of sensor nodes which co-ordinate with each other to perform some specific function. These sensor nodes are mainly in large numbers and are densely deployed either inside the phenomenon or very close to it. They can be used for various application...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Contribution Time-Based Selfish Nodes Detection Scheme

    ln a Mobile Ad hoc NETwork (MANET), each node has to rely on others to relay its packets. Since most mobile nodes are typically constrained by power and computing resources, some nodes may choose not to cooperative by refusing to do so while still using the network to forward their...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Node Feed-Back Based TCP Scheme for Mobile Ad-Hoc Network

    TCP is a reliable connection oriented transport layer protocol widely used for the Internet. But its performance decreases when deployed over mobile ad-hoc networks. TCP assumes all packets losses are due to congestion therefore invoking congestion control mechanism thus reducing network throughput. Many schemes have been reported to improve TCP...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Vehicular Network Communications: Research Challenges and Future Directions

    The technology within vehicles has evolved over the years offering drivers various facilities. This paper will present how Vehicle To Vehicle (V2V) communication can be enhanced using an ad hoc network design. This paper also relates the communication technology that is and has been available for many previous years. It...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Novel Blind Spectrum Sensing Approach for Cognitive Radios

    Cognitive radio is believed to facilitate an efficient utilization of radio spectrum. Blind spectrum sensing is a key requirement enabling a cognitive radio technology by creating an awareness of other users' activities. This paper presents a novel blind spectrum sensing technique with a computationally efficient signal processing scheme which can...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Experimental Investigation of the Performance of OOK-NRZ and RZ Modulation Techniques Under Controlled Turbulence Channel in FSO Systems

    A number of modulation schemes have been proposed and thoroughly studied for the successful operation of the Optical Wireless Communication (OWC). Each modulation scheme has its advantages and disadvantages for the particular channel conditions. In this paper, the comparative studies of On-Off Keying (OOK) Return-to-Zero (RZ) and Non-Return-to-Zero (NRZ) modulation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of Blind Search Techniques in Structured P2P Networks

    The ability to perform complex queries is one of the most important features in many of the P2P networks actually deployed today. While structured P2P networks can provide very efficient look-up operations via a Distributed Hash Table (DHT) interface, they traditionally do not provide any methods for complex queries. This...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Supporting Elastic Cloud Computation With Intention Description Language

    The continuing shift towards cloud computing is a major influence in today's industry. The proliferation and availability of cloud computing facilities, including on-demand platforms, on-premises platforms and Platform as a Service (PaaS), is a key part of that shift. Theoretically, therefore, it ought to be straightforward to create a new...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Simulation Based Analysis on Applicability of Active Measurement Over Wireless Access

    Packet Level Monitoring has been performed using both active and passive measurement techniques. If used appropriately, these techniques allow network parameters (i.e. delay, loss, and bandwidth etc) to be accurately evaluated, and hence used in fault and performance measurement, network provisioning, and traffic engineering and performance prediction. The authors investigated...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Simulation Tools for Use in Mobile Ad-Hoc Networks

    This paper discusses and evaluates three of the most popular simulator tools available (NS-2, GloMoSim and OPNET) that enable researchers to conduct work in the field of Mobile Ad-Hoc Networks. The paper discusses, how each of the three simulators operates, the accessibility, ease of installation, reported bugs, available documentation, the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Gateway Selection in Mobile Ad-Hoc Networks

    Mobility has evolved from single node mobility (Mobile IP), to NEtwork MObility (NEMO BS), and finally to efficient Mobile Ad-hoc networks NEMOs (MANEMO). MANEMO is vaguely defined and there is no IETF MANEMO standard. There has been no standard solution to utilize multiple Internet gateways in MANEMO. To solve this...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    AODV Routing Protocol in Heterogeneous Networks

    This paper considers the impact of unidirectional links on Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) routing protocol. Heterogeneity of a node's transmission range within Mobile Ad-Hoc NETworks (MANETs) most often results from unidirectional link between a pair of nodes. The creation of such link prevents the proper operation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Network Mobility and Fragmentation in Wireless Mesh Internetworks: Issues and Challenges

    There has been a dramatic increase in the number of mobile IP devices attached to the fringe Internet. As devices reduce in cost and their capabilities increase, the vision of ubiquitous computing looks to be realised. As a result the number of wireless devices found in the Internet fringe will...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Real-Time Data Mining Methodology and Emergency Knowledge Discovery in Wireless Sensor Networks

    Real-time data mining can extract event knowledge for fire detection more promptly than the traditional detection approach. The paper mainly describes the real-time data mining process for fulfilling rapid emergency response in wireless sensor network. The authors evaluate the performance of this process by simulation. Wireless sensor networks have attracted...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Energy Efficiency With Adaptive Modulation and Spectrum Sharing for Cellular Systems

    The increasing concern about the energy consumption of cellular network is driving operators to optimise energy utilisation without sacrificing user experience. In this paper, the authors consider the capability of spectrum sharing between two operators with the objective of achieving energy efficient operation. Furthermore, they will study the effect of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Framework of Multicast Mobility in Heterogeneous Networks

    It can be seen that nowadays mobile devices can support various technologies such as 3G cellular, WLAN, Bluetooth, etc. The main goal in the wireless telecommunications world is to provide communication anywhere, anytime. Due to the requirements of multimedia applications, the issues of multimedia and mobility in heterogeneous networks are...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Downlink Sum-Rate Performance for Cooperation and Coordination Between Three Interfering Sectors

    In this paper, the authors investigate the performance of various transmission schemes for the downlink cellular system. These schemes are either biased towards interference minimisation or the efficient utilisation of the available resources. A mathematical model for the various schemes is presented and the performance measure is based on the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    The Key Elements of Cognitive Radio: A Survey

    Cognitive radio is recent technologies to solve the problem of the spectrum scarcity. It is an intelligent wireless communication system that is aware of its environment, learns from it and adapts its transmission features according to statistical variations in the environment to maximize utilization of spectrum while ensuring quality of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Evaluation of Routing Algorithms in Delay/ Disruption Tolerant Network

    The framework of Delay/Disruption Tolerant Network (DTN) is recently received an extensive attention and widely implemented, ranging from Wireless Sensor Network to interplanetary network. It has a promising future in military affairs, scientific research and exploration. With the characteristic of long delay, intermittent connectivity, limitation of node buffer size and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Power Reduction Technique for GMPLS-Based Photonic Networks

    Green photonic network designs centre on techniques to reduce and conserve energy within multilayer network environments. In this paper, a hibernation mode is proposed to reduce network power consumption; network configurations form selective group of nodes, segmenting the links and partitioning the wavelength within connections to enable "Sleep" modes. An...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Trust Routing in MANET for Securing DSR Routing Protocol

    In this paper, the authors describe a new authentication service and trust level attached in every packet to make the routing in Mobile Ad Hoc Network secure. Efficient operation of Ad Hoc networks is dependent on maintaining appropriate routing information in a distributed fashion. The routing protocol is vulnerable to...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Justifying a Policy Based Approach for DDoS Remediation: A Case Study

    Following the outbreak of conflict between Russia and Georgia and the infamous collapse of the Estonian network infrastructure in 2007, Distributed Denial of Service (DDoS) attacks have emerged as a new political weapon. In response to this, and anticipating the vulnerability of banking, energy and communications systems to Internet attacks,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of VANET's Authentication

    Vehicular Ad hoc NETworks (VANET) have recently drawn the attention of the research community. Vehicular Ad-hoc NETworks (VANET's) represent a rapidly emerging, particularly challenging class of MANETs. Vehicular Communications (VC) aim to enhance safety and efficiency of transportation systems. Vehicular applications will provide warnings on environmental hazards, traffic and road...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    System-of-Systems Security: A Survey

    The area of System-of-Systems research is focused on using multiple complex and disparate systems to create a goal orientated solution that provides functionality greater than that of its component parts. This paper describes the concepts of System-of-Systems through an exploration of recent definitions and characteristics, and presents some often cited...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Mongoose: A TCP Fair Second Life Client

    Metaverses such as Second Life (SL) are a relatively new type of Internet application. Their functionality is similar to online 3D games but differs in that users are able to construct the environment their avatars inhabit and are not constrained by predefined goals. From the network perspective metaverses are similar...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    NHUGS: Towards Scalability Testing for MMOGs Within an Extensible, Open Architecture

    Massively Multiplayer Online Games (MMOGs) such as Activision Blizzard's World of Warcraft have become an increasingly popular sector of the games industry with the leading games boasting user subscriptions in excess of 10 million. The sheer volume of users places a burden upon the scalability of these software systems and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    VoDPStream - The Optimized Design and Implementation of a P2P-Based VoD System

    The rising number of Internet users brings about greater demand for VoD streaming. However, the quality of audio and video data streaming to displays are not satisfying enough; huge expenditures also dishearten network media providers. Better operation and Quality of Service (QoS) call for smarter resolutions. This paper proposes an...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Spatial and Frequency Domain Analysis of the Effect of Removal Attacks on Digital Image Watermarks

    Digital image watermarking is one of the most widely used techniques for protection of ownership rights of digital images. Its commercial applications range from copyright protection to digital rights management. However, although there have been numerous new proposed digital image watermarking techniques, most are not sufficiently robust against watermark attacks....

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Self Organised Cellular Networks as the Future of Wireless Communication

    An introduction into self organizing cellular networks is presented. This paper has generated a lot of research interest over the past few years as operators have identified it as a necessary feature in future wireless communication systems. The authors review projects which have studied self organization and with knowledge of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Evaluation of Voice Cell Jitter and Delay for ATM Network Using a Jitter Management Algorithm

    In this paper, the authors present the effect of their proposed Chunk-based Jitter Management (CJM) algorithm on Asynchronous Transfer Mode (ATM) Network. The simulation environment shows the effect of voice traffic on the performance of cell data transmission in ATM network. They show simulation results for a tested scenario, and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Technology and Social Implications of a Free Wireless Internet Access for Mobile Devices in Liverpool: A Case Study

    This paper presents the technological and social implications of Internet access for all wireless devices in Liverpool. This paper is based on free Internet access and discusses how this project could be realized with proposed solutions for generating revenue. It will also look at the technology and the infrastructure required...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Handover Optimization for Real-Time Application in Mobile WiMAX / IEEE 802.16e

    The demand for wireless broadband services is growing rapidly. Mobile WiMAX is one of the most promising technologies for broadband wireless communication. It allows users to roam over the network under vehicular speeds. However since IEEE 802.16e standard for Mobile WiMAX defines only hard handover mandatory, Mobile WiMAX cannot transmit...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Autonomic Network Management for Next Generation Networks

    With the exponential growth of current computer networks, the need for autonomic network management is clearly increasing. While there have been many attempts to tackle autonomicity in network management environments, the platforms are too specific and apply only to very specific environments. A different approach is presented in this paper...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Impact of Power Saving on SNMP-Based Network Management

    Simple Network Management Protocol (SNMP) is the most popular and widely used network management protocol within most heterogeneous network environments. But due to technological advancement, mobile networks are increasingly being deployed within wired network environments through wireless access points. Despite the fact that mobile devices exhibit operational characteristics that include...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Fault-Tolerant Network Management Architecture for Wireless Sensor Networks

    Energy-efficient network self-organization and fault-tolerance have been identified as key challenges in the design and operations of Wireless Sensor Network (WSNs). To address these challenges, the authors proposed a Zone-based Fault-Tolerant Management Architecture (ZFTMA) for WSNs. The proposed architecture is composed of two novel contributions: an energy-efficient network self-organization scheme...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Misbehaviour Metrics in WiMAX Networks Under Attack

    Much effort has been taken to make WiMAX a secure technology. Due to its broadcast nature, WiMAX is more susceptible to security threats than a wired network. In this paper, the authors give a general overview of the security architecture and possible attacks that a WiMAX network may face. For...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Dynamic Policy Specification in Ubiquitous Environments

    Policies, which are commonly used in ubiquitous environments, are hopeful solutions for securing interaction of systems between different organisations. However, in any systems or environments within a ubiquitous computing where user interaction or inter organization communication is of paramount importance, there is the potential for interactions between systems to occur...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Device-Free Passive Localisation Using RSSI-Based Wireless Network Nodes

    In recent years, the use of wireless sensor networks has increased. This is due in part to the increasing miniaturization, decreasing costs and the identification of real-world scenarios where sensors can be deployed. Devicefree Passive (DfP) localisation is the identification of a person without the need for any physical devices...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Sensor Networks Management: A Survey

    Wireless Sensor Networks (WSNs) have gradually established interests of developing new wireless monitoring and environmental control applications in the twenty-first century. The ad hoc nature and deploy-and-leave vision make it even more attractive in applications i.e. environmental monitoring, medical, safety, transportation and military. Most of these WSN applications share similar...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of Communication and Sensing for Energy Management of Appliances

    Concerns about climate change and dwindling legacy energy sources has lead to pressing energy management focus. Smart Grid has been a key concept in beginning to address these concerns. This paper focuses on the edge of the smart grid and the control and management of energy consumption in appliances. The...

    Provided By Liverpool John Moores University