Learn More
—We present a survey of approaches for providing broadband Internet access to trains. We examine some of the barriers that hinder the use of broadband Internet on trains and then discuss some of the opportunities for broadband deployment to trains. This survey considers some of the basic concepts for providing broadband Internet access and then reviews(More)
—Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to mitigate(More)
Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to mitigate(More)
—There has been increasing interest in incorporating sensing systems into objects or the environment for monitoring purposes. In this work we compare approaches to performing fully-distributed anomaly detection as a means of detecting security threats for objects equipped with sensing and communication abilities. With the desirability of increased(More)
In the United States there is an emerging trend to ship goods by rail directly from ports to inland intermodal traffic terminals. However, for this trend to succeed shippers must have " visibility " into rail shipments. In this research we seek to provide visibility into shipments through optimal placement of sensor and communication technology. We formally(More)
This paper describes a scheme, AEDCF-CW/PF, that allows stations implementing IEEE 802.11e to have varying maximum contention window sizes and persistence factors. The values of these parameters are adjusted using knowledge of the station's collision probability. Our research indicates that stations implementing this scheme experience much lower frame(More)
—Wireless sensor networks consist of autonomous, self-organizing, low-power nodes which collaboratively measure data in an environment and cooperate to route this data to its intended destination. Black hole attacks are potentially devastating attacks on wireless sensor networks in which a malicious node uses spurious route updates to attract network(More)
Multiple communications, networking, and computer platforms are available for sensor network applications, ranging from motes to complex sensor nodes; which include fully configured computers. Several of these platforms were evaluated for use in a SensorNet architecture with multiple owners. A unique feature of this endeavor is that it goes beyond basic(More)
Many groups have identified sensor networks as a technology that can contribute to the national need to monitor and detect threats. Most of the work on sensor networks focuses on a wireless network to interconnect sensors and convey telemetry data to a collection point. While the underlying radio and communications technology are prerequisites and still(More)