scholarly journals A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments

Author(s):  
Leelani Kumari Wickramasinghe ◽  
Seng Wai Loke ◽  
Arkady Zaslavsky ◽  
Damminda Alahakoon
2009 ◽  
pp. 135-171
Author(s):  
Soe-Tsyr Yuan ◽  
Fang-Yu Chen

Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P applications concern merely the sharing of a variety of contents. For magnifying the sharing extent for wireless service provision in the vicinity (i.e., the wireless P2P environments), this chapter presents a novel approach (briefly named UbiSrvInt) that is an attempt to enable a pure P2P solution that is context aware and fault tolerant for ad-hoc wireless service provision. This approach empowers an autonomous peer to propel distributed problem solving (e.g., in the travel domain) through service sharing and execution in an intelligent P2P way. This approach of ad-hoc wireless service provision is not only highly robust to failure (based on a specific clustering analysis of failure correlation among peers) but also capable of inferring a user’s service needs (through a BDI reasoning mechanism utilizing the surrounding context) in ad-hoc wireless environments. The authors have implemented UbiSrvInt into a system platform with P-JXTA that shows good performance results on fault tolerance and context awareness.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Ezedin Barka ◽  
Chaker Abdelaziz Kerrache ◽  
Nasreddine Lagraa ◽  
Abderrahmane Lakas ◽  
Carlos T. Calafate ◽  
...  

Ensuring the desired level of security is an important issue in all communicating systems, and it becomes more challenging in wireless environments. Flying Ad Hoc Networks (FANETs) are an emerging type of mobile network that is built using energy-restricted devices. Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. In the literature, various solutions have been proposed to ensure secure and reliable internode communications, and these FANET nodes are known as Unmanned Aerial Vehicles (UAVs). In general, these UAVs are often detected as malicious due to an unintentional misbehavior related to the physical features of the UAVs, the communication mediums, or the network interface. In this paper, we propose a new context-aware trust-based solution to distinguish between intentional and unintentional UAV misbehavior. The main goal is to minimize the generated error ratio while meeting the desired security levels. Our proposal simultaneously establishes the inter-UAV trust and estimates the current context in terms of UAV energy, mobility pattern, and enqueued packets, in order to ensure full context awareness in the overall honesty evaluation. In addition, based on computed trust and context metrics, we also propose a new inter-UAV packet delivery strategy. Simulations conducted using NS2.35 evidence the efficiency of our proposal, called UNION, at ensuring high detection ratios > 87% and high accuracy with reduced end-to-end delay, clearly outperforming previous proposals known as RPM, T-CLAIDS, and CATrust.


Author(s):  
Paolo Bellavista ◽  
Rebecca Montanari ◽  
Daniela Tibaldi ◽  
Alessandra Toninelli

The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad hoc collaborations. This chapter introduces the challenge of identifying and validating novel security models/systems for securing ad hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-theart solutions for trust management and access control in wireless environments by pointing out both the need for their tight integration and the related emerging design guidelines, that is, exploitation of context awareness and adoption of semantic technologies.


2014 ◽  
Vol 2014 ◽  
pp. 1-18
Author(s):  
Chun-I Fan ◽  
Yi-Hui Lin ◽  
Tuan-Hung Hsu ◽  
Ruei-Hau Hsu

In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also be considered in key agreement systems due to diversified network domains. However, only few identity-based multiparty conference key agreement schemes for single domain environments and none for interdomain environments were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this paper, we will propose a novel efficient single domain identity-based multiparty conference key scheme and extend it to an interdomain one. Finally, we prove that the proposed schemes satisfy the required security attributes via formal methods.


Pflege ◽  
2020 ◽  
Vol 33 (5) ◽  
pp. 289-298
Author(s):  
Katharina Silies ◽  
Angelika Schley ◽  
Janna Sill ◽  
Steffen Fleischer ◽  
Martin Müller ◽  
...  

Zusammenfassung. Hintergrund: Die COVID-19-Pandemie ist eine Ausnahmesituation ohne Präzedenz und erforderte zahlreiche Ad-hoc-Anpassungen in den Strukturen und Prozessen der akutstationären Versorgung. Ziel: Ziel war es zu untersuchen, wie aus Sicht von Führungspersonen und Hygienefachkräften in der Pflege die stationäre Akutversorgung durch die Pandemiesituation beeinflusst wurde und welche Implikationen sich daraus für die Zukunft ergeben. Methoden: Qualitative Studie bestehend aus semistrukturierten Interviews mit fünf Verantwortlichen des leitenden Pflegemanagements und drei Hygienefachkräften in vier Krankenhäusern in Deutschland. Die Interviews wurden mittels qualitativer Inhaltsanalyse ausgewertet. Ergebnisse: Die Befragten beschrieben den auf die prioritäre Versorgung von COVID-19-Fällen hin umstrukturierten Klinikalltag. Herausforderungen waren Unsicherheit und Angst bei den Mitarbeiter_innen, relative Ressourcenknappheit von Material und Personal und die schnelle Umsetzung neuer Anforderungen an die Versorgungleistung. Dem wurde durch gezielte Kommunikation und Information, massive Anstrengungen zur Sicherung der Ressourcen und koordinierte Steuerung aller Prozesse durch bereichsübergreifende, interprofessionelle Task Forces begegnet. Schlussfolgerungen: Die in der COVID-19-Pandemie vorgenommenen Anpassungen zeigen Entwicklungspotenziale für die zukünftige Routineversorgung auf, z. B. könnten neue Arbeits- und Skill Mix-Modelle aufgegriffen werden. Für die Konkretisierung praktischer Implikationen sind vertiefende Analysen der Daten mit zeitlichem Abstand erforderlich.


2006 ◽  
Vol 5 (2) ◽  
pp. 68-71 ◽  
Author(s):  
Simone Kauffeld
Keyword(s):  
Ad Hoc ◽  

Zusammenfassung. Der FEO, der in Kooperation mit betrieblichen Praktikern entwickelt wurde, dient der Erfassung des Organisationsklimas. Er umfasst 82 Items und bildet 12 Skalen ab. Eine Stärke des FEO im Gegensatz zu ad hoc entwickelten Befragungsinstrumenten sind die Vergleichsdaten, die für Profit- und Non-Profit-Organisationen bereit gestellt werden. Kritisch diskutiert wird die theoretische Verortung, die Anwenderfreundlichkeit sowie der Nutzen der individuellen Auswertung. Die konsensuale, konvergente, diskriminante und kriterienbezogene Validierung steht aus.


Sign in / Sign up

Export Citation Format

Share Document