Statistics & Computer Science
Permanent URI for this collectionhttp://repository.kln.ac.lk/handle/123456789/3751
Browse
10 results
Search Results
Item Human Perception of Haptic Force Direction(IROS 2006 IEEE/RSJ International Conference, 2006) Elhajj, I.; Weerasinghe, K.G.H.D.; Dika, A.; Hansen, R.In this paper we investigate the accuracy of human perception of haptic force direction applied to the hand. Haptic interfaces are commonly used in many applications and understanding the limitations of human perception would facilitate the design of these interfaces and the associated applications. The literature contains work related to force perception; however, none of which address the issue of the accuracy of haptic force direction perception. We discuss the design and implementation of the experiment used to evaluate the accuracy. Also presented are results related to training effects, fatigue and accuracy across angular regionsItem Analysis of key management in wireless sensor networks(IEEE EIT?07, 2007) Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H.A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors as the level of secrecy of the data being captured, the amount of computation done to the captured data, and the criticality of the data being available when needed. This paper aims to identify the various types of WSNs in existence today, review some of the key management schemes proposed by the community, and map each type of WSN to a set of these key management schemes that would be ideal to handle the security requirements for that network. Through our research, we aide in solving the question as to whether or not there exists any specific security concerns which are prevalent in a majority of WSNs in use today.Item Data centric adaptive in-network aggregation for wireless sensor networks(IEEE/ASME International Conference, 2007) Weerasinghe, K.G.H.D.; Elhajj, I.; Krsteva, A.; Najm, M.A.This paper presents and evaluates a data centric adaptive in-network aggregation algorithm for wireless sensor networks. In-Network data aggregation is used in wireless sensor networks to reduce the power consumption of sensor nodes. The accuracy of the aggregated results is highly sensitive to delays in the measurements. All existing methods use fixed time limit to accept delayed information for aggregation. The proposed method dynamically calculates the delay limit by using the historical behavior of each sensor. The presented simulation results illustrate the advantage of the developed algorithm.Item ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications(GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010) Weerasinghe, K.G.H.D.; Fu, H.Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. This paper proposes an Efficient and Scalable Authentication Protocol (ESAP) that provides anonymity and conditional privacy for vehicular ad hoc networks based on the self-generated certificates. The proposed ESAP provides all required security services such as authentication, message integrity, non-repudiation and revoking malicious vehicles in an efficient and scalable manner while supporting user anonymity, location privacy and conditional privacy. Moreover, accuracy of this protocol does not depend on the availability of Road Side Units.Item Anonymous service access for Vehicular Ad hoc Networks(Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011) Weerasinghe, K.G.H.D.; Fu, H.; Leng, S.Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel location privacy enhancement protocol for VANETs. Firstly, we propose an Anonymous Online Service Access (AOSA) protocol. Secondly, we analytically evaluate the anonymity and the unlinkability of the proposed protocol. Finally, a series of simulation studies are conducted to evaluate the performance of our protocol in the real VANET environments such as Manhattan and Urban scenarios. According to analytical evaluation and simulations, our protocol provides higher level of anonymity and location privacy for on-line service access applications. Simulation results further show that our protocol is feasible and produces better performance in real VANET environments by producing higher success ratio and smaller delay.Item An Enhanced Multi-Channel MAC for the IEEE 1609.4 Based Vehicular Ad Hoc Networks(INFOCOM IEEE Conference on Computer Communications Workshops, 2010) Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D.This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize the intervals based on the traffic condition. The scheme also introduces a multi-channel coordination mechanism to provide the contention-free access in SCHs. Theoretical analysis and simulation results show that the proposed scheme is able to help IEEE 1690.4 MAC improve the saturation throughput of SCHs significantly, while maintaining the prioritized transmission of critical safety information on the CCH.Item Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation(International Journal of Software Engineering and Its Applications, 2008) Weerasinghe, K.G.H.D.; Fu, H.A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In [9], we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-toend delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in [9] presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution proposed in [9] can accurately prevent the cooperative black hole attacks.Item Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate(Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010) Jin, K.; Weerasinghe, K.G.H.D.; Fu, H.Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 MAC and PHY protocols. Although this extension version provides well-designed MAC and PHY functions, it has some significant shortcomings in handling packet errors. When a packet error rate, one of the most important performance parameters in wireless network simulations, applies to the extension, a simulation program is interrupted with some fatal errors. Besides, as the packet errors are handled on the PHY layer in this version, MAC layer loses its own right of treating the packet errors. In this paper, we modify the extension version to correct the mentioned problems and verify the behavior of our modified version by simulation work. And also, we perform the ns-2 simulation to investigate the impact of error rate on IEEE 802.11p-based vehicular ad-hoc networks.Item Verifying position and velocity for vehicular ad-hoc networks(Security and Communication Networks, 2011) Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H.In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for the automobile field. Position and velocity play important roles in these applications such as collision avoidance. Forged position or velocity information will make a severe impact on both performance and security of the vehicular ad-hoc network (VANET). The main challenges in developing secure position and velocity schemes for VANETs are the highly dynamic environment and cost constraints. In this paper, we propose a position and velocity verification scheme. Then via ns-2, we simulate the proposed scheme in various vehicular mobility environments including rural, urban and Manhattan. Finally, we evaluate the proposed scheme for both position and velocity verifications with automotive grade differential global positioning system (DGPS) and intentionally induced errors as well. The performance evaluation results show that (1) our scheme is very precise in both position and velocity verifications and (2) the proposed scheme is very robust in position verification for rural, urban and Manhattan scenarios even if the introduced errors are in the order of 10?m. Copyright ? 2010 John Wiley & Sons, Ltd.Item Enhancing unlinkability in Vehicular Ad Hoc Networks(Intelligence and Security Informatics (ISI), 2011 IEEE International Conference, 2011) Weerasinghe, K.G.H.D.; Huirong, F.Communication messages in Vehicular Ad-hoc Networks (VANETs) can be used to track movement of vehicles. In this paper, we address the problem of movement tracking and enhance location privacy without affecting security and safety of vehicles. By considering unique characteristics of VANETs, we firstly propose a synchronized pseudonym changing protocol based on the concept of forming groups among neighboring vehicles. Secondly, we analytically evaluate the anonymity and unlinkability of the proposed protocol. Finally, we do a series of simulations to evaluate the performance of our protocol in real VANET environments such as Manhattan and Urban. Simulation results show that our protocol is feasible and produces excellent performances. The main advantages of our protocol compared with the existing approaches include: 1) it makes larger anonymity set and higher entropy; 2) it reduces the tracking probability; 3) it can be used in both safety and non-safety communications; and 4) Vehicles need not suspend regular communication for changing pseudonyms.