Matthew Spear

Learn More
In this paper, we present a social network based network communication architecture, Davis Social Links (DSL). DSL uses the trust and relationships inherent to human social networks to provide an enhanced communication architecture for future Internet designs. We begin with a conceptual discussion of how future network architectures can leverage social(More)
Recently there has been an influx of work on extending a wireless sensor networks lifetime by distributing source compression and deploying non-homogeneous nodes to handle the aggregation. Both of these mechanisms have been shown to increase the network's lifetime, but they each have requirements that might not be plausible. With distributed source(More)
As wireless motes are battery powered, many listen-sleep Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been ignored. In this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC protocols. This attack can(More)
Many tasks require multiple sensing capabilities; in wireless sensor networks (WSNs), it is expensive to deploy a homogeneous network wherein every sensor has the same functionality. Instead, it is economical to deploy a heterogeneous network wherein sensors differ in their capabilities; in such a network, efficient data querying is essential. We propose a(More)
Online Social Networks (OSN) are experiencing an explosive growth rate and are becoming an increasingly important part of people's lives. There is an increasing desire to aid online users in identifying potential friends, interesting groups, and compelling products to users. These networks have offered researchers almost total access to large corpora of(More)
— In large Wireless Sensor Networks (WSNs), each hop might incur varying delays due to medium access contention, transmission and computation delays. Fast and efficient query responses are essential to network performance and maintenance. To save energy in battery-powered sensors, it is desirable that data be aggregated or compressed along the way toward(More)
When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing success, the Internet is under increasing attack, e.g. spams, Denial of Service (DoS), Domain Name Server hijacking, etcetera. This paper introduces a clean-slate approach to(More)
  • 1