Daniel Fokum

Learn More
We present a survey of approaches for providing broadband Internet access to trains. We examine some of the barriers that hinder the use of broadband Internet on trains and then discuss some of the opportunities for broadband deployment to trains. This survey considers some of the basic concepts for providing broadband Internet access and then reviews(More)
This thesis describes a system called the Transportation Security SensorNet that can be used to perform extensive cargo monitoring. It is built as a Service Oriented Architecture (SOA) using open web service specifications and Open Geospatial Consortium (OGC) standards. This allows for compatibility, interoperability and integration with other web services(More)
Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to mitigate(More)
Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to mitigate(More)
There has been increasing interest in incorporating sensing systems into objects or the environment for monitoring purposes. In this work we compare approaches to performing fully-distributed anomaly detection as a means of detecting security threats for objects equipped with sensing and communication abilities. With the desirability of increased visibility(More)
In the United States there is an emerging trend to ship goods by rail directly from ports to inland intermodal traffic terminals. However, for this trend to succeed shippers must have “visibility” into rail shipments. In this research we seek to provide visibility into shipments through optimal placement of sensor and communication technology. We formally(More)
Wireless sensor networks consist of autonomous, self-organizing, low-power nodes which collaboratively measure data in an environment and cooperate to route this data to its intended destination. Black hole attacks are potentially devastating attacks on wireless sensor networks in which a malicious node uses spurious route updates to attract network traffic(More)
The secure delivery of data between a source node and a sink node is an open problem in wireless sensor networks. We review the security model used for The University of Kansas’s SensorNet project, and discuss how it might be improved by using a secure routing protocol. In this paper we extend work done in developing multipath extensions to AODV. Unlike(More)
This paper describes a scheme, AEDCF-CW/PF, that allows stations implementing IEEE 802.11e to have varying maximum contention window sizes and persistence factors. The values of these parameters are adjusted using knowledge of the station’s collision probability. Our research indicates that stations implementing this scheme experience much lower frame(More)