Learn More
The increasing usage of cloud computing, along with the proliferation of mobile devices and the demand for multimedia services, are changing the life style of users and creating new opportunities to providers and clients. Multimedia data will account for up to 90% of all Internet traffic in a few years, where most of the content will be created, shared, and(More)
Indoor localization has attracted much attention recently due to its potential for realizing indoor location-aware application services. This paper considers a time-critical scenario with a team of soldiers or first responders conducting emergency mission operations in a large building in which infrastructure-based localization is not feasible (e.g., due to(More)
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distributed way(More)
Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle, the performance, size, weight, and power of commercial off-the-shelf mobile phones and tablets are sufficient to support such applications, provided that efficient protocols and mechanisms are put in(More)
First responders at the edge of the network rely on situation awareness updates to arrive in a timely matter, even when the fixed infrastructure is unavailable. The technical advancements of the commercial mobile phones make them capable of supporting such requirements under very disruptive network conditions. In this demo, we present a network architecture(More)
This paper presents a secure communication application called DiscoverFriends. Its purpose is to communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management(More)
In our study, we seek to learn the real-time crowd levels at popular points of interests based on users continually sharing their location data. We evaluate the benefits of users sharing their location data privately and non-privately, and show that suitable privacy-preserving mechanisms provide incentives for user participation in a private study as(More)
Mobile underwater networks have recently been proposed as a way to explore and observe the ocean with a wide area coverage at reasonable cost when compared to traditional tethered approaches (e.g., seabed sensors) [1]–[4]. To achieve this goal, a swarm of mobile sensors, e.g., Autonomous Underwater Vehicles (AUVs) such as REMUS and IVER2 or floats such as(More)
In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to allow mixing only at(More)
Access control (authentication, authorization, and verification) is the most frequently occurring security action in the electric sector, and a multi-factor technique is recommended as one of the most promising solutions. However, the technique, despite its huge potential, has been underutilized with limitations, e.g., applied only to authentication and(More)