2015
DOI: 10.1007/978-3-319-23165-5_29
|View full text |Cite
|
Sign up to set email alerts
|

ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge

Abstract: Abstract. Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distributed way remains as an active research area, and few implementation results on mobile devices exist. In these scenarios, where users both produce and cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…A way forward in addressing this issue might be to alternate nodes from active to parked mode and vice versa when certain criteria are met (e.g., the replica level is within the predefined thresholds). (6) bool InsideAnyCluster ← False; (7) foreach in ConnectedComponents do (8) if IsMember(NodeId(Slot), , ReceivedFIs) then (9) ← ∪ NodeId(Slot); (10) InsideAnyCluster ← True; (11) b r e a k ; (12) end (13) end (14) if not InsideAnyCluster then (15) Cluster New; (16) New ← New ∪ NodeId(Slot); (17) ConnectedComponents ← ConnectedComponents ∪ New; (18) end (19) end Algorithm 2: Cluster set computation.…”
Section: Discussion and Currentmentioning
confidence: 99%
See 2 more Smart Citations
“…A way forward in addressing this issue might be to alternate nodes from active to parked mode and vice versa when certain criteria are met (e.g., the replica level is within the predefined thresholds). (6) bool InsideAnyCluster ← False; (7) foreach in ConnectedComponents do (8) if IsMember(NodeId(Slot), , ReceivedFIs) then (9) ← ∪ NodeId(Slot); (10) InsideAnyCluster ← True; (11) b r e a k ; (12) end (13) end (14) if not InsideAnyCluster then (15) Cluster New; (16) New ← New ∪ NodeId(Slot); (17) ConnectedComponents ← ConnectedComponents ∪ New; (18) end (19) end Algorithm 2: Cluster set computation.…”
Section: Discussion and Currentmentioning
confidence: 99%
“…(3) for ← 1 to Length(LocalFI) do (4) BCHHeard← BasicChannel(LocalFI, ); (5) foreach in receivedFIs do (6) Position ← Shift( , ); 7Ch a n n e l← BasicChannel( , position); (8) Co ll i s i o n← False; (9) Ow n ed← Owner(Channel); (10) if Owned and NotSameId(Channel, Heard) then (11) C o l l i s i o n← True; (12) b r e a k ; (13) end (14) end (15) if Collision then (16) UpdateBoard(Reservationboard, , Free); (17) UpdateFI(LocalFI, , Free); (18) if = Id(Heard) then (19) C o l l i s i o n ( T r u e ) ; (20) EnterContention(); (21) end (22) else (23) if (AdditionalAndExpired(Channel)) then (24) UpdateBoard(board, , Free); (25) else (26) UpdateBoard(board, , Reserved); into account the number of nodes available in that particular cluster; that is, the minimum threshold is computed as the Min(Min thresh , card( )).…”
Section: Controlling the Spatial Distribution Of The Datamentioning
confidence: 99%
See 1 more Smart Citation
“…The functionality of the security framework is designed to compose with the other features of the underlying ICN [25,26]. Since content encryption occurs at file granularity, it is transparent to the routing, caching, and network coding components (that operate on data objects corresponding to encrypted files instead of the original ones).…”
Section: Methodsmentioning
confidence: 99%
“…), but in the last few years there have been attempts to transfer this theory to Network Defense (known in this case as CyberSA) [3,12]. Focusing mostly on improving data and attack visualization by using different technologies and interfaces, so the defenders can easily process network data [14,16,17]. This paper focuses on experiments with different SA Measurement techniques in the networking environment [1,2,4,13].…”
Section: Introductionmentioning
confidence: 99%