To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Wireless networks are typically divided into three classes depending on their range of transmissions. We have personal area networks (PANS) that have a very low transmission range, of the order of several meters; Bluetooth happens to be the representative network or technology when wireless personal area networks are mentioned. On a slightly larger transmission scale, of the order of 100–200 meters, we have wireless local area networks (LANs), known as 802.11 or WiFi, which are very well deployed all over the world. The personal area and local area networks have been primarily designed for indoor applications. Networks that have transmission in the range of several kilometers are known as wireless wide area networks (WANs), and cellular networks of different vintages are prime examples of such networks. So any discussion of security in a wireless environment will not be complete unless the proposed security schemes for these three distinct networks are examined. In this chapter, I briefly go over the security schemes of wireless PAN, LAN, and WAN networks. For readers interested in knowing more about these topics, appropriate references are highlighted. I begin this chapter by discussing WiFi security, followed by cellular network security, and concluding with the security of personal area networks.
Wireless local area networks (IEEE 802.11) security
Introduction
A wireless local area network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative to, a wired LAN. Wireless local area networks transmit and receive data over the air via RF technology, minimizing the need for any wired connections, and in turn, combining data connectivity with user mobility.
Wireless mobile ad hoc networks consist of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. Supporting appropriate quality of service for mobile ad hoc networks is a complex and difficult issue because of the dynamic nature of the network topology and generally imprecise network state information, and has become an intensely active area of research in the last few years. This chapter presents the basic concepts of quality of service support in ad hoc networks for unicast communication, reviews the major areas of current research and results, and addresses some new issues. The focus is on routing issues associated with quality of service support. The chapter concludes with some observations on areas for further investigation.
Introduction
Mobile ad hoc networks offer unique benefits and versatility for certain environments and certain applications. Since a fixed infrastructure, including base stations, is not necessary, they can be created and used “any time, anywhere.” Second, such networks could be intrinsically fault-resilient, for they do not operate under the limitations of a fixed topology. Indeed, since all nodes are allowed to be mobile, the composition of such networks is necessarily time varying. Addition and deletion of nodes occur only by interactions with other nodes; no other agency is involved.
The previous chapters discussed mandatory security requirements, which include confidentiality, authentication, integrity, and non-repudiation. These, in turn, require some form of cryptography, certificates, and signatures. Some other security-related mechanisms include user authentication, explicit transaction authorization, end-to-end encryption, accepted log-on security (biometrics) instead of separate personal identification numbers (PINs) and passwords, intrusion detection, access control, logging, and audit trail. In this chapter, I present some of the security schemes that govern trust among the communicating entities. Governance of the trust can be based on principles and practices of key management in distributed networks or other means such as authentication. Additionally, this chapter discusses several well known methods that are related to key management and authentication.
The resurrecting duckling
The resurrecting duckling security model [1] has been developed to solve the secure transient association problem. An example of this would be when a person buying a remote control would not want any other person to be able to use another remote control bought at the same shop to work at his place, but then the remote control has to work for some other person who might buy it from the first owner. Like a duckling, who considers the first moving object it sees to be its mother, in the same way a device would recognize the first entity that sends it a secret key as its owner. When necessary, the owner could later clear the imprinting and let the device change its owner.
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security; more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure and the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks and countering attacks might end up being too little too late. Secondly, with so much advancement in hacking, if attackers try hard enough, they will eventually succeed in infiltrating the system. This makes it important to monitor constantly (or at least periodically) what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation, etc.). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. This chapter discusses the problem of intrusion detection in mobile ad hoc networks and presents the solutions that have been proposed so far.
Introduction
Wireless ad hoc networks have been in focus within the wireless research community. Essentially, these are networks that do not have an underlying fixed infrastructure. Mobile hosts “join” in, on the fly, and create a network on their own. With the network topology changing dynamically and the lack of a centralized network management functionality, these networks tend to be vulnerable to a number of attacks.
The IEEE has created a new standard, called IEEE 802.16, that deals with providing broadband wireless access to residential and business customers, and is popularly known as WiMax [1]. The Worldwide Interoperability for Microwave Access (WiMax) is a non-profit industry trade organization that is overseeing the implementation of this standard, which is expected to replace services like Cable, DSL, and T1 line for last-mile broadband network access. It can replace these services because it has a target transmission rate that can exceed 100 Mbps. The transmission range for the WiMax devices is stated to be up to 31 miles, which also far exceeds WiFi's transmission range of approximately 100 meters [2, 3]. With such a large transmission range, a single base station is capable of providing broadband connections to even an entire city. This chapter, briefly introduces the WiMax standard and then discusses the security and privacy features of such networks.
Introduction
The WiMax standard was designed with the ability to provide quality of service (QoS); as a result it can support delay-sensitive applications and services. Since it is connection oriented, it has the ability to perform per-connection QoS, allowing it to operate in both dedicated and best-effort situations.
The WiMax standard was created to meet the growing demand for broadband wireless access (BWA). This demand has proven to be challenging for service providers due to the absence of a global standard. Currently, many service providers have created proprietary solutions based on a modified version of 802.11 instead.
Recent advances in simultaneous localization and mapping permit robots to autonomously explore enclosed environments and, subsequently, navigate to selected positions within them. But, for many tasks, it is more useful to immediately navigate to goals in unexplored environments, without a map. This is possible if a human director can describe the ideal route to the robot using grounded symbols that both parties can perceive directly.
In this paper, a mobile robot is autonomously navigated to many locations in a cluttered laboratory environment by a variety of routes. A series of topological navigation instructions are provided in advance by the director, in a form that can be expressed verbally and translates easily to software representation. The instructions are based on the perception of spatial affordances available to the robot, namely nearby junctions and edges in a pruned Generalized Voronoi Diagram. The operator can generate the instructions by viewing or imagining the environment without any measurements. Only three to five instructions are needed to navigate anywhere in our laboratory. The instructions contain only topology. No spatial measurements or environmental data such as landmarks are provided to the robot.
A famous result of Freĭman describes the sets A, of integers, for which |A+A| ≤ K|A|. In this short note we address the analogous question for subsets of vector spaces over . Specifically we show that if A is a subset of a vector space over with |A+A| ≤ K|A| then A is contained in a coset of size at most 2O(K3/2 log K)|A|, which improves upon the previous best, due to Green and Ruzsa, of 2O(K2)|A|. A simple example shows that the size may need to be at least 2Ω(K)|A|.
The HM(X) system is a generalization of the Hindley/Milner system parameterized in the constraint domain X. Type inference is performed by generating constraints out of the program text, which are then solved by the domain-specific constraint solver X. The solver has to be invoked at the latest when type inference reaches a let node so that we can build a polymorphic type. A typical example of such an inference approach is Milner's algorithm W. We formalize an inference approach where the HM(X) type inference problem is first mapped to a CLP(X) program. The actual type inference is achieved by executing the CLP(X) program. Such an inference approach supports the uniform construction of type inference algorithms and has important practical consequences when it comes to reporting type errors. The CLP(X) style inference system, where X is defined by Constraint Handling Rules, is implemented as part of the Chameleon system.
Global localization of mobile robots has been well studied using the extended Kalman filter (EKF) method. This paper presents a fuzzy extended information filtering (FEIF) approach to improving global localization of an indoor autonomous mobile robot with ultrasonic and laser scanning measurements. A real-time FEIF algorithm is proposed to improve accuracy of static global pose estimation via multiple ultrasonic data. By fusing odometric, ultrasonic, and laser scanning data, a real-time FEIF-based pose tracking algorithm is developed to improve accuracy of the robot's continuous poses. Several experimental results are performed to confirm the efficacy of the proposed methods.
Linear typing schemes can be used to guarantee non-interference and so the soundness of in-place update with respect to a functional semantics. But linear schemes are restrictive in practice, and more restrictive than necessary to guarantee soundness of in-place update. This limitation has prompted research into static analysis and more sophisticated typing disciplines to determine when in-place update may be safely used, or to combine linear and non-linear schemes. Here we contribute to this direction by defining a new typing scheme that better approximates the semantic property of soundness of in-place update for a functional semantics. We begin from the observation that some data are used only in a “read-only” context, after which it may be safely re-used before being destroyed. Formalising the in-place update interpretation in a machine model semantics allows us to refine this observation, motivating three usage aspects apparent from the semantics that are used to annotate function argument types. The aspects are (1) used destructively, (2), used read-only but shared with result, and (3) used read-only and not shared with the result. The main novelty is aspect (2), which allows a linear value to be safely read and even aliased with a result of a function without being consumed. This novelty makes our type system more expressive than previous systems for functional languages in the literature. The system remains simple and intuitive, but it enjoys a strong soundness property whose proof is non-trivial. Moreover, our analysis features principal types and feasible type reconstruction, as shown in M. Konečn'y (In TYPES 2002 workshop, Nijmegen, Proceedings, Springer-Verlag, 2003).
This paper presents a novel method for localization of mobile robots in structured environments. The estimation of the position and orientation of the robot relies on the minimisation of the partial Hausdorff distance between ladar range measurements and a floor plan image of the building. The approach is employed in combination with an extended Kalman filter to obtain accurate estimates of the robot's position, heading and velocity. Good estimates of these variables were obtained during tests performed using a differential drive robot, thus demonstrating that the approach provides an accurate, reliable and computationally feasible alternative for indoor robot localization and autonomous navigation.
We analyse the weighted height of random tries built from independent strings of i.i.d. symbols on the finite alphabet {1, . . .d}. The edges receive random weights whose distribution depends upon the number of strings that visit that edge. Such a model covers the hybrid tries of de la Briandais and the TST of Bentley and Sedgewick, where the search time for a string can be decomposed as a sum of processing times for each symbol in the string. Our weighted trie model also permits one to study maximal path imbalance. In all cases, the weighted height is shown to be asymptotic to c log n in probability, where c is determined by the behaviour of the core of the trie (the part where all nodes have a full set of children) and the fringe of the trie (the part of the trie where nodes have only one child and form spaghetti-like trees). It can be found by maximizing a function that is related to the Cramér exponent of the distribution of the edge weights.
We formulate and give partial answers to several combinatorial problems on volumes of simplices determined by n points in 3-space, and in general in d dimensions.
(i) The number of tetrahedra of minimum (non-zero) volume spanned by n points in 3 is at most , and there are point sets for which this number is . We also present an O(n3) time algorithm for reporting all tetrahedra of minimum non-zero volume, and thereby extend an algorithm of Edelsbrunner, O'Rourke and Seidel. In general, for every , the maximum number of k-dimensional simplices of minimum (non-zero) volume spanned by n points in d is Θ(nk).
(ii) The number of unit volume tetrahedra determined by n points in 3 is O(n7/2), and there are point sets for which this number is Ω(n3 log logn).
(iii) For every , the minimum number of distinct volumes of all full-dimensional simplices determined by n points in d, not all on a hyperplane, is Θ(n).
Refactoring is an established technique from the object-oriented (OO) programming community to restructure code: it aims at improving software readability, maintainability, and extensibility. Although refactoring is not tied to the OO-paradigm in particular, its ideas have not been applied to logic programming until now. This paper applies the ideas of refactoring to Prolog programs. A catalogue is presented listing refactorings classified according to scope. Some of the refactorings have been adapted from the OO-paradigm, while others have been specifically designed for Prolog. The discrepancy between intended and operational semantics in Prolog is also addressed by some of the refactorings. In addition, ViPReSS, a semi-automatic refactoring browser, is discussed and the experience with applying ViPReSS to a large Prolog legacy system is reported. The main conclusion is that refactoring is both a viable technique in Prolog and a rather desirable one.
We study the case of integrating situational reasoning into a mobile service recommendation system. Since mobile Internet services are rapidly proliferating, finding and using appropriate services require profound service descriptions. As a consequence, for average mobile users it is nowadays virtually impossible to find the most appropriate service among the many offered. To overcome these difficulties, task navigation systems have been proposed to guide users towards best-fitting services. Our goal is to improve the user experience of such task navigation systems making them context-aware (i.e. to optimize service navigation by taking the user's situation into account). We propose the integration of a situational reasoning engine that applies classification-based inference to qualitative context elements, gathered from multiple sources and represented using ontologies. The extended task navigator enables the delivery of situation-aware recommendations in a proactive way. Initial experiments with the extended system indicate a considerable improvement of the navigator's usability.
A challenging issue to advance the existing P2P semantic routing protocols is related to the capability of developing mechanisms for focused selection of the query recipients by taking into account a semantically rich description of the context of each peer. In this article, we present the H-Link semantic routing approach designed to exploit the results of an ontology matchmaking process for providing a semantic overlay network where peers having similar contexts are recognized and interlinked as semantic neighbors. In particular, H-Link aims at advancing the existing semantic routing protocols by combining ontology-based peer context descriptions and ontology matching techniques for providing query forwarding on a real semantic basis, in a completely decentralized way.