scispace - formally typeset
Search or ask a question
Author

B.R. Preiss

Bio: B.R. Preiss is an academic researcher from BlackBerry Limited. The author has contributed to research in topics: Wireless network & WiMAX. The author has an hindex of 2, co-authored 2 publications receiving 218 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The proposed Pi protocol is a practical incentive protocol, called Pi, such that when a source node sends a bundle message, it also attaches some incentive on the bundle, which is not only attractive but also fair to all participating DTN nodes.
Abstract: Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagation delays within the network. As a result, the message propagation process in DTNs follows a store-carryand- forward manner, and the in-transit bundle messages can be opportunistically routed towards the destinations through intermittent connections under the hypothesis that each individual DTN node is willing to help with forwarding. Unfortunately, there may exist some selfish nodes, especially in a cooperative network like DTN, and the presence of selfish DTN nodes could cause catastrophic damage to any well designed opportunistic routing scheme and jeopardize the whole network. In this paper, to address the selfishness problem in DTNs, we propose a practical incentive protocol, called Pi, such that when a source node sends a bundle message, it also attaches some incentive on the bundle, which is not only attractive but also fair to all participating DTN nodes. With the fair incentive, the selfish DTN nodes could be stimulated to help with forwarding bundles to achieve better packet delivery performance. In addition, the proposed Pi protocol can also thwart various attacks, which could be launched by selfish DTN nodes, such as free ride attack, layer removing and adding attacks. Extensive simulation results demonstrate the effectiveness of the proposed Pi protocol in terms of high delivery ratio and lower average delay.

222 citations

Proceedings ArticleDOI
19 May 2008
TL;DR: The performance evaluation demonstrates that the proposed credit-based authentication scheme is secure and effectively reduces the overall delay and overhead in user authentication for delay tolerant mobile wireless networks.
Abstract: In this paper, a credit-based user authentication scheme is proposed for delay tolerant mobile wireless networks. The proposed authentication scheme isolates the uncertain network condition in the high-delay wireless backhaul with high error rate, and accelerates the overall authentication process when the mobile terminal roams in the visited network. The performance evaluation demonstrates that the proposed credit-based authentication scheme is secure and effectively reduces the overall delay and overhead in user authentication for delay tolerant mobile wireless networks.

4 citations


Cited by
More filters
01 Jan 2007
TL;DR: In this paper, the authors provide updates to IEEE 802.16's MIB for the MAC, PHY and asso-ciated management procedures in order to accommodate recent extensions to the standard.
Abstract: This document provides updates to IEEE Std 802.16's MIB for the MAC, PHY and asso- ciated management procedures in order to accommodate recent extensions to the standard.

1,481 citations

Journal ArticleDOI
TL;DR: The architecture and unique security and privacy requirements for the next generation mobile technologies on cloud-based IoT are introduced, the inappropriateness of most existing work is identified, and several interesting open problems are suggested with promising ideas to trigger more research efforts in this emerging area.
Abstract: The Internet of Things is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. Unfortunately, due to the unique characteristics of resource constraints, self-organization, and shortrange communication in IoT, it always resorts to the cloud for outsourced storage and computation, which has brought about a series of new challenging security and privacy threats. In this article, we introduce the architecture and unique security and privacy requirements for the next generation mobile technologies on cloud-based IoT, identify the inappropriateness of most existing work, and address the challenging issues of secure packet forwarding and efficient privacy preserving authentication by proposing new efficient privacy preserving data aggregation without public key homomorphic encryption. Finally, several interesting open problems are suggested with promising ideas to trigger more research efforts in this emerging area.

486 citations

Journal ArticleDOI
TL;DR: The issues that existing CACC control modules face when considering close to ideal driving conditions are discussed, including how to keep drivers engaged in driving tasks during CACC operations.
Abstract: Cooperative adaptive cruise control (CACC) systems have the potential to increase traffic throughput by allowing smaller headway between vehicles and moving vehicles safely in a platoon at a harmonized speed. CACC systems have been attracting significant attention from both academia and industry since connectivity between vehicles will become mandatory for new vehicles in the USA in the near future. In this paper, we review three basic and important aspects of CACC systems: communications, driver characteristics, and controls to identify the most challenging issues for their real-world deployment. Different routing protocols that support the data communication requirements between vehicles in the CACC platoon are reviewed. Promising and suitable protocols are identified. Driver characteristics related issues, such as how to keep drivers engaged in driving tasks during CACC operations, are discussed. To achieve mass acceptance, the control design needs to depict real-world traffic variability such as communication effects, driver behavior, and traffic composition. Thus, this paper also discusses the issues that existing CACC control modules face when considering close to ideal driving conditions.

382 citations

Proceedings ArticleDOI
11 Jun 2012
TL;DR: The design and implementation of a system, Serendipity, that enables a mobile computation initiator to use remote computational resources available in other mobile systems in its environment to speedup computing and conserve energy is presented.
Abstract: Mobile devices are increasingly being relied on for services that go beyond simple connectivity and require more complex processing Fortunately, a mobile device encounters, possibly intermittently, many entities capable of lending it computational resources At one extreme is the traditional cloud-computing context where a mobile device is connected to remote cloud resources maintained by a service provider with which it has an established relationship In this paper we consider the other extreme, where a mobile device's contacts are only with other mobile devices, where both the computation initiator and the remote computational resources are mobile, and where intermittent connectivity among these entities is the norm We present the design and implementation of a system, Serendipity, that enables a mobile computation initiator to use remote computational resources available in other mobile systems in its environment to speedup computing and conserve energy We propose a simple but powerful job structure that is suitable for such a system Serendipity relies on the collaboration among mobile devices for task allocation and task progress monitoring functions We develop algorithms that are designed to disseminate tasks among mobile devices by accounting for the specific properties of the available connectivity We also undertake an extensive evaluation of our system, including experience with a prototype, that demonstrates Serendipity's performance

381 citations

Journal ArticleDOI
TL;DR: The basic idea of iTrust is introducing a periodically available Trusted Authority to judge the node's behavior based on the collected routing evidences and probabilistically checking, and correlates detection probability with a node's reputation, which allows a dynamic detection probability determined by the trust of the users.
Abstract: Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks (DTNs) Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node's behavior based on the collected routing evidences and probabilistically checking We model iTrust as the inspection game and use game theoretical analysis to demonstrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN routing at a reduced cost To further improve the efficiency of the proposed scheme, we correlate detection probability with a node's reputation, which allows a dynamic detection probability determined by the trust of the users The extensive analysis and simulation results demonstrate the effectiveness and efficiency of the proposed scheme

170 citations