Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks

Total Page:16

File Type:pdf, Size:1020Kb

Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks Position-Based Packet Forwarding for Vehicular Ad-Hoc Networks Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universität Mannheim vorgelegt von Dipl. Wirtsch.–Inf. Holger Martin Füßler aus Stutensee Mannheim, 2007 Dekan: Professor Dr. Matthias Krause, Universität Mannheim Referent: Professor Dr. Wolfgang Effelsberg, Universität Mannheim Korreferentin: Professor Dr. Martina Zitterbart, Universität Karlsruhe Tag der mündlichen Prüfung: 30. April 2007 ii Vorwort (Preface) Was Du ererbt von Deinen Vätern, erwirb es, um es zu besitzen. (Johann Wolfgang von Goethe) Bis zu meiner Diplomarbeit hatte ich mich nie mit wissenschaftlicher Arbeit beschäftigt. Ich bin nie Hiwi gewesen, noch hatte ich irgendeine Ahnung, wie ein Lehrstuhl, sei es im Hinblick auf Lehre oder im Hinblick auf Forschung, funktioniert. Damit ist klar, dass ich alles, was ich heute kann, weiß, und bin, meinen geistigen Vätern verdanke. Der in mehrerlei Hinsicht wichtigste Vater dieser Dissertation ist mein Doktor- Vater Professor Doktor Wolfgang Effelsberg. Ohne ihn wäre ich zum einen nicht auf die Idee gekommen, nach dem Diplom eine Promotion zu versuchen, und zum anderen wäre dieses Werk sicher nicht das, was es geworden ist. Auch bedankt sei an dieser Stelle meine Korreferentin, Frau Professor Doktor Martina Zitterbart von der Universität Karlsruhe, die trotz immenser zeitlicher Belastung zugestimmt hat, meiner Dissertation Pate zu stehen. In fachlicher Hinsicht gilt mein Dank in erster Linie der bei meiner Ankunft frisch geschmiedeten Ad-Hoc Netzwerk Gruppe am Lehrstuhl Effelsberg. Hier sind ganz besonders Doktor Martin Mauve und Doktor Hannes Hartenstein (damals NEC Network Labs Europe), beides heute ordentliche Professoren, zu nennen. Sie hatten den Weg mit der bereits erfolgten Beantragung des FleetNet Projektes geebnet und mit der Idee, Routing positionsbasiert zu machen, den Grundstein für alle späte- ren Publikationen gelegt. Zusammen mit meinem Zimmernachbarn Jörg Widmer haben sie mich ganz neu Lesen und Schreiben, wissenschaftliche Methodik, Gut- achtenerstellung und etwa das Betreuen von Studenten gelehrt. Besonders in dieser Hinsicht war ich ein williger Schüler und habe während meiner Promotion alleine 15 Abschlussarbeiten und viele Hiwis und Praktikanten betreuen dürfen. Diese Arbeit hat mir sehr viel Spaß und auch wissenschaftlichen Erfolg bereitet, haben es doch die Ergebnisse mancher Abschlussarbeit in Publikationen und letzten Endes in die- se Arbeit geschafft. Als jemand, der seine Heimat sehr gerne hat, hat mir die Arbeit mit Studenten auch immer wieder Hoffnung gemacht, dass doch nicht alles schlecht sein kann, wenn es so junge, intelligente, und fleißige Menschen gibt, die sich im Team allen Herausforderungen gestellt haben. Einen besonders großen Einfluss auf iii meine Arbeit haben hierbei Michael Käsemann, Christian Lochert, Wolfgang Kieß, Michael Möske, Angelika Leibscher und Matthias Transier gehabt. Ganz besonders stolz bin ich auf die “meiner Studis”, die nun selbst nach einer Promotion streben. So ist Matthias Transier ein wunderbarer Kollege geworden, dem ich fachlich und persönlich sehr viel verdanke. Von den vielen anderen Kollegen am Lehrstuhl, die immer wieder viel zum Werden meiner Gedanken beigetragen haben, sei beson- ders Gerald Kühne erwähnt, der mir gerade als sehr junger Doktorand, unheimlich freundlich und mit großer Geduld beim Lösen von Programmieraufgaben geholfen hat. Stellvertretend für die vielen, nationalen und internationalen, Kollegen, die mir durch ihre Kommentare und Erklärungen wertvolle Beiträge zu meiner Arbeit ge- leistet haben, möchte ich Richard Gold von der Universität Uppsala in Schweden nennen, der mir unter anderem UNIX-Netzwerkprogrammierung auf einem anson- sten langweiligen FleetNet-Treffen beigebracht hat. Einen extra Absatz möchte ich unserem “staff”, insbesondere Frau Betty Haire- Weyerer widmen: Ihr ist es zu verdanken, dass ich diese Arbeit auf Englisch verfas- sen und damit einem größeren Publikum öffnen konnte. Dieselbe Leistung, nämlich die sprachliche Kontrolle meiner Arbeit, hat sie während der ganzen Promotion für die meisten meiner Aufsätze erbracht. Außerdem war sie vielen am Lehrstuhl die “Mutter der Kompanie” und hat nicht selten als Schnittstelle zu Prof. Effelsberg funktioniert. Auch ihrer Nachfolgerin Ursula Eckle und unserem Systemprogram- mierer Walter Müller gilt mein Dank für deren Unterstützung. Wie oben schon angedeutet hat das FleetNet Projekt lange Zeit die Rahmen- bedingungen und Ziele meiner Arbeit vorgegeben. Damit nicht genug, hat es mir die Chance eröffnet, an bedeutsamer Stelle am Entstehen einer neuen Technolo- gie mitzuwirken und hierbei viel über Entwicklungs- und Entscheidungsprozesse der deutschen Automobilindustrie zu lernen. Hierbei möchte ich besonders Herrn Doktor Walter Franz von DaimlerChrysler erwähnen, der mit großem Geschick Fle- etNet eine Richtung gegeben hat. An dieser Stelle muss natürlich auch NEC Network Labs Europe genannt werden, die lange Zeit meine Stelle kofinanziert haben. Neben Hannes Hartenstein war hierfür später Dr. Andreas Festag verantwortlich, immer unter der Führung von Dr. Heinrich Stüttgen. Vielen Dank für Dach und Brot und die wunderbaren vielen Ressourcen. Der wunderbarste Projektpartner im FleetNet- Nachfolgeprojekt “Network-on-Wheels” war für mich die Universität Karlsruhe mit dem wunderbaren Team von Prof. Hartenstein, zunächst Marc Torrent-Moreno und später Felix Schmidt-Eisenlohr. In ihnen leben viele unserer Ansätze weiter. Keineswegs weniger wichtig für meine Arbeit waren mein privates Umfeld. Meinen Eltern, Oskar und Waltraud, verdanke ich neben meinem Leben meine Ausbildung und Förderung, Meine Mutter Waltraud, die leider während meiner Doktoranden- zeit verstorben ist, hat mir vor ihrem Tod einmal gesagt, wie stolz sie mein aka- iv demischer Erfolg macht. Mama, an Dich, im Himmel: Ich hab’s geschafft. Vielen Dank! In über fünf Jahren kommen und gehen viele Menschen. Ganz besonders wichtig sind hierbei die “alten Freunde” und die Familie, die immer da zu sein scheinen, wenn man sie braucht. Meine Schwester mit ihrer wunderbaren Familie, Herbert, Si- las und Maika. Meine lieben Freunde Michael, Schmacko, Maddin und Axel. Meine Mentoren Michael Schmiady und Karl-Heinz Dubronner. Ob es nur Dampf ablassen, das versuchte Verhindern von Fachidiotie oder einfach wunderschönes Privatleben war. Ihr habt immer an mich geglaubt; manchmal mehr als ich selbst. Holger Füßler, Mannheim, im Februar 2007 v vi Abstract Mobile Ad-Hoc Networks, or MANETs, are data communication networks between (potentially) mobile computer systems equipped with wireless communication de- vices and — in their purest form — in complete absence of communication infras- tructure. Usage scenarios for these systems include communication during disaster recovery or battlefield communications. One of the great research challenges concerning MANETs is the Packet Forwarding Problem, i.e., the question to which neighbor node a data packet should be handed over to reach non-neighboring nodes. While this problem has been previously solved by the adaption of classic routing algorithms from wired networks, the availability of GPS enables to include information about the geographic position of nodes into the routing decision, by selecting forwarders that are geographically closest to the destination. While these algorithms have been shown to improve communication performance in networks with a high degree of node mobility, they require (a) a beaconing service that allows every node to build a table of its neighbors and (b) a so-called Location Service that allows to acquire the current position of non- neighboring nodes in the network. In this thesis, we propose Contention-Based Forwarding (or CBF), a greedy rout- ing heuristic that is no longer in need of a beaconing service. Moreover, a forwarding node running CBF does not at all select the next forwarder explicitly but broadcasts the packet containing its own position and the position of the destination. The selection of the forwarding is now done in a contention period, where every possible forwarder, i.e., every receiver of the packet, considers its own suitability to for- ward by calculating the geographical progress for the packet if forwarded by itself. Then it waits for a time reciprocal to this suitability before simply retransmitting. If the retransmission of a packet is overheard, the own postponed retransmission process is canceled. In this thesis, we demonstrate that CBF outperforms beacon and position-based routing by delivering packets with constant overhead, almost ignorant of mobility. Also, we introduce two strategies to cope with the problem of packet duplication. A problem left open by greedy routing heuristics is routing in the presence of local optima, or voids. Voids are node placement situations, where — in spite of an existing route — no neighboring node is geographically closer to the destina- tion than the current forwarder. In these situations, greedy forwarding fails and standard graph-based recovery well known from classical Position-Based Forward- vii ing cannot be applied due to the lack of the beacon-based construction of neighbor tables. As a solution, we propagate Contention-Based Distance Vector Routing, a contention-based adaption of AODV that acquires topology information in the area of the void and does contention on the topological distance to the forwarder. Besides the forwarding algorithms, we extend position-based routing by two lo-
Recommended publications
  • Auditing Overhead, Auditing Adaptation, and Benchmark Evaluation in Linux Lei Zeng1, Yang Xiao1* and Hui Chen2
    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:3523–3534 Published online 4 June 2015 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1277 RESEARCH ARTICLE Auditing overhead, auditing adaptation, and benchmark evaluation in Linux Lei Zeng1, Yang Xiao1* and Hui Chen2 1 Department of Computer Science, The University of Alabama, Tuscaloosa 35487-0290, AL, U.S.A. 2 Department of Mathematics and Computer Science, Virginia State University, Petersburg 23806, VA, U.S.A. ABSTRACT Logging is a critical component of Linux auditing. However, our experiments indicate that the logging overhead can be significant. The paper aims to leverage the performance overhead introduced by Linux audit framework under various us- age patterns. The study on the problem leads to an adaptive audit-logging mechanism. Many security incidents or other im- portant events are often accompanied with precursory events. We identify important precursory events – the vital signs of system activity and the audit events that must be recorded. We then design an adaptive auditing mechanism that increases or reduces the type of events collected and the frequency of events collected based upon the online analysis of the vital-sign events. The adaptive auditing mechanism reduces the overall system overhead and achieves a similar level of protection on the system and network security. We further adopt LMbench to evaluate the performance of key operations in Linux with compliance to four security standards. Copyright © 2015 John Wiley & Sons, Ltd. KEYWORDS logging; overhead; Linux; auditing *Correspondence Yang Xiao, Department of Computer Science, The University of Alabama, 101 Houser Hall, PO Box 870290, Tuscaloosa 35487-0290, AL, U.S.A.
    [Show full text]
  • Adecuándose a La Norma ISO/IEC 1799 Mediante Software Libre
    Adecu´andose a la norma ISO/IEC 1799 mediante software libre * Jose Fernando Carvajal Vi´on Grupo de Inter´esen Seguridad de ATI (ATI-GISI) <[email protected]> Javier Fern´andez-Sanguino Pe˜na Grupo de Inter´esen Seguridad de ATI (ATI-GISI) <[email protected]> 28 de octubre de 2002 Resumen Este art´ıculo muestra la forma de adecuar a la norma ISO/IEC 17999 un sistema de informaci´onimplementado en un servidor cuyo software de sistema operativo se basa en alguna alternativa de software Libre y c´odigo abierto. La utilizaci´onde una distribuci´onDebian GNU/Linux sirve como base a la que a˜nadir las utilidades y paquetes necesarios para conseguir el objetivo. ´Indice 1. Introducci´on 1 2. Objetivo y Asunciones 2 3. Cumplimiento de la Norma ISO/IEC 17799 en GNU/Linux 4 4. Conclusiones 4 5. Referencias 5 6. Referencias de herramientas 7 7. Referencias Generales 11 *Copyright (c) 2002 Jose Fernando Carvajal y Javier Fern´andez-Sanguino. Se otorga permiso para copiar, distribuir y/o modificar este documento bajo los t´erminos de la Licencia de Documen- taci´onLibre GNU, Versi´on1.1 o cualquier otra versi´onposterior publicada por la Free Software Foundation. Puede consultar una copia de la licencia en: http://www.gnu.org/copyleft/fdl.html 1 1. Introducci´on De forma general para mantener la seguridad de los activos de informaci´on se deben preservar las caracter´ısticas siguientes [1]. 1. Confidencialidad: s´oloel personal o equipos autorizados pueden acceder a la informaci´on. 2. Integridad: la informaci´on y sus m´etodos de proceso son exactos y completos.
    [Show full text]
  • Examining Ambiguities in the Automatic Packet Reporting System
    Examining Ambiguities in the Automatic Packet Reporting System A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Electrical Engineering by Kenneth W. Finnegan December 2014 © 2014 Kenneth W. Finnegan ALL RIGHTS RESERVED ii COMMITTEE MEMBERSHIP TITLE: Examining Ambiguities in the Automatic Packet Reporting System AUTHOR: Kenneth W. Finnegan DATE SUBMITTED: December 2014 REVISION: 1.2 COMMITTEE CHAIR: Bridget Benson, Ph.D. Assistant Professor, Electrical Engineering COMMITTEE MEMBER: John Bellardo, Ph.D. Associate Professor, Computer Science COMMITTEE MEMBER: Dennis Derickson, Ph.D. Department Chair, Electrical Engineering iii ABSTRACT Examining Ambiguities in the Automatic Packet Reporting System Kenneth W. Finnegan The Automatic Packet Reporting System (APRS) is an amateur radio packet network that has evolved over the last several decades in tandem with, and then arguably beyond, the lifetime of other VHF/UHF amateur packet networks, to the point where it is one of very few packet networks left on the amateur VHF/UHF bands. This is proving to be problematic due to the loss of institutional knowledge as older amateur radio operators who designed and built APRS and other AX.25-based packet networks abandon the hobby or pass away. The purpose of this document is to collect and curate a sufficient body of knowledge to ensure the continued usefulness of the APRS network, and re-examining the engineering decisions made during the network's evolution to look for possible improvements and identify deficiencies in documentation of the existing network. iv TABLE OF CONTENTS List of Figures vii 1 Preface 1 2 Introduction 3 2.1 History of APRS .
    [Show full text]
  • Building Embedded Linux Systems ,Roadmap.18084 Page Ii Wednesday, August 6, 2008 9:05 AM
    Building Embedded Linux Systems ,roadmap.18084 Page ii Wednesday, August 6, 2008 9:05 AM Other Linux resources from O’Reilly Related titles Designing Embedded Programming Embedded Hardware Systems Linux Device Drivers Running Linux Linux in a Nutshell Understanding the Linux Linux Network Adminis- Kernel trator’s Guide Linux Books linux.oreilly.com is a complete catalog of O’Reilly’s books on Resource Center Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web plat- form: Linux, Apache, MySQL, and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today for free. main.title Page iii Monday, May 19, 2008 11:21 AM SECOND EDITION Building Embedded Linux SystemsTomcat ™ The Definitive Guide Karim Yaghmour, JonJason Masters, Brittain Gilad and Ben-Yossef, Ian F. Darwin and Philippe Gerum Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Building Embedded Linux Systems, Second Edition by Karim Yaghmour, Jon Masters, Gilad Ben-Yossef, and Philippe Gerum Copyright © 2008 Karim Yaghmour and Jon Masters.
    [Show full text]
  • Praise for the Official Ubuntu Book
    Praise for The Official Ubuntu Book “The Official Ubuntu Book is a great way to get you started with Ubuntu, giving you enough information to be productive without overloading you.” —John Stevenson, DZone Book Reviewer “OUB is one of the best books I’ve seen for beginners.” —Bill Blinn, TechByter Worldwide “This book is the perfect companion for users new to Linux and Ubuntu. It covers the basics in a concise and well-organized manner. General use is covered separately from troubleshooting and error-handling, making the book well-suited both for the beginner as well as the user that needs extended help.” —Thomas Petrucha, Austria Ubuntu User Group “I have recommended this book to several users who I instruct regularly on the use of Ubuntu. All of them have been satisfied with their purchase and have even been able to use it to help them in their journey along the way.” —Chris Crisafulli, Ubuntu LoCo Council, Florida Local Community Team “This text demystifies a very powerful Linux operating system . in just a few weeks of having it, I’ve used it as a quick reference a half dozen times, which saved me the time I would have spent scouring the Ubuntu forums online.” —Darren Frey, Member, Houston Local User Group This page intentionally left blank The Official Ubuntu Book Sixth Edition This page intentionally left blank The Official Ubuntu Book Sixth Edition Benjamin Mako Hill Matthew Helmke Amber Graner Corey Burger With Jonathan Jesse, Kyle Rankin, and Jono Bacon Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • Mode D'emploi
    Toujours là pour vous aider Enregistrez votre produit et obtenez de l'assistance sur le site www.philips.com/support AW2000 Des questions ? Contactez Philips Mode d'emploi Table des matières Français 1 Important 2 7 Informations sur le produit 26 Spécificités 26 Sécurité 2 Avertissement 3 8 Dépannage 27 2 Votre récepteur Hi-Fi sans fil 4 Introduction 4 9 Annexe : Signification des Contenu de l'emballage 4 couleurs du voyant 29 Autres éléments nécessaires... 4 Présentation de l'unité principale 5 3 Préparation 6 Téléchargez Philips AirStudio sur votre smartphone ou vos tablettes 6 Connexion à un système d'enceintes existant 7 Connectez l'alimentation électrique et allumez l'appareil 8 4 Connexion de votre AW2000 au réseau Wi-Fi domestique 9 Option 1 : configuration de la connexion sans fil à un routeur autre que WPS par l'intermédiaire d'un appareil iOS 10 Option 2 : configuration par l'intermédiaire d'un routeur Wi-Fi autre que WPS et d'un appareil Android 12 Option 3 : configuration de la connexion sans fil à un routeur WPS 14 Option 4 : configuration de la connexion filaire via un câble Ethernet 16 5 Lecture 17 Diffusez le son audio sur votre AW2000 17 Écoutez des stations de radio Internet sur votre AW2000 20 Lecture à partir d'un appareil externe 23 6 Mise à niveau du micrologiciel 24 FR 1 g N'obstruez pas les orifices de ventilation. 1 Important Installez l'appareil conformément aux consignes du fabricant. h Ne retirez pas le boîtier de l'appareil. i L'appareil ne doit pas être exposé Sécurité aux fuites goutte à goutte ou aux éclaboussures, à la pluie ou à l'humidité.
    [Show full text]
  • The Official Ubuntu Book
    Praise for Previous Editions of The Official Ubuntu Book “The Official Ubuntu Book is a great way to get you started with Ubuntu, giving you enough information to be productive without overloading you.” —John Stevenson, DZone book reviewer “OUB is one of the best books I’ve seen for beginners.” —Bill Blinn, TechByter Worldwide “This book is the perfect companion for users new to Linux and Ubuntu. It covers the basics in a concise and well-organized manner. General use is covered separately from troubleshooting and error-handling, making the book well-suited both for the beginner as well as the user that needs extended help.” —Thomas Petrucha, Austria Ubuntu User Group “I have recommended this book to several users who I instruct regularly on the use of Ubuntu. All of them have been satisfied with their purchase and have even been able to use it to help them in their journey along the way.” —Chris Crisafulli, Ubuntu LoCo Council, Florida Local Community Team “This text demystifies a very powerful Linux operating system . In just a few weeks of having it, I’ve used it as a quick reference a half-dozen times, which saved me the time I would have spent scouring the Ubuntu forums online.” —Darren Frey, Member, Houston Local User Group This page intentionally left blank The Official Ubuntu Book Seventh Edition This page intentionally left blank The Official Ubuntu Book Seventh Edition Matthew Helmke Amber Graner With Kyle Rankin, Benjamin Mako Hill, and Jono Bacon Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • Securing Linux
    466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iii How to Cheat at Securing Linux Mohan Krishnamurthy Eric S. Seagren Raven Alder Aaron W. Bayles Josh Burke Skip Carter Eli Faskha 466_HTC_Linux_FM.qxd 10/2/07 10:05 AM Page iv Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. PUBLISHED BY Syngress Publishing, Inc.
    [Show full text]
  • Linux Auditing: Overhead and Adaptation
    IEEE ICC 2015 - Communication and Information Systems Security Symposium 1 Linux Auditing: Overhead and Adaptation Lei Zeng, Yang Xiao* Hui Chen Department of Computer Science, Department of Mathematics and The University of Alabama, Computer Science, Tuscaloosa, AL 35487-0290 USA Virginia State University, Email: [email protected] Petersburg, VA 23806 USA *Prof. Yang Xiao is the corresponding author Abstract— Logging is a critical component of Linux auditing. The Common Criteria is closely related to the Orange Book. The experiments indicate that the logging overhead can be Its goal is to establish a guideline for developing and significant. The paper aims to leverage the performance evaluating computer products in regards to its security overhead introduced by Linux audit framework under various features. The Common Criteria concentrates on the security usage patterns. The study on the problem leads an adaptive audit logging mechanism. The adaptive auditing mechanism reduces threads from human activities. It reiterates the audit the overall system overhead and achieves a similar level of requirement for secure computer systems. Logging is essential protection on the system and network security. to meet the requirement. Although these standards recognize the importance of auditing, the focus is obviously placed in Index items: logging, overhead, Linux, auditing; bookkeeping audit trail/log, which is in fact the system activity log. In regard to the logging functionality of computer systems, I. INTRODUCTION audit information must be recorded and protected selectively UDITING in operating systems (OSs) is necessary to [1, 2, 3, 4]. It is the logging functionality that keeps and A achieve network and system security.
    [Show full text]
  • How to Cheat at Configuring Open Source Security Tools
    436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 441_HTC_OS_FM.qxd 4/12/07 1:32 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and deliv- ering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional mate- rials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value- added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Virginia Tech Ground Station TNC Interfacing Tutorial
    Virginia Tech Ground Station TNC Interfacing Tutorial Zach Leffke, MSEE ([email protected]) Research Associate Aerospace Systems Lab Ted & Karyn Hume Center for National Security and Technology 3/23/2018 Agenda VHF/UHF • TNC Connection Overview 3.0m Dish Antennas • KISS Protocol 4.5m Dish • AX.25/HDLC Protocol • AFSK/FSK/GMSK Modulation • ….System Review…. • OSI Stack • Remote Connection Students assembling • VTGS Remote Interface 4.5m Dish • Summary Deployable Space@VT Ops Center 1.2m Dish GNU Radio at work (students preparing for 2016 RockSat Launch) 3/23/2018 TNC Interfacing Tutorial 2 Preview of the Finale…………… Primary Ground Station - UPEC Host Computer Client Software TNC TC SW TNC SW SoundCard AX.25 AX.25 KISS Interface KISS HDLC RADIO Localhost DATA FM TCP TCP AFSK D to A LOOPBACK IN RF Spacecraft IP IP IP IP MAC C&DH Audio Audio Comput HOST OS NETWORK RADIO er TC SW FIRMWARE AX.25 AX.25 KISS HDLC KISS AFSK SERIAL Remote Ground Station - VTGS FM SERIAL RF Host Computer Telecommand (TC) TTL Serial Software TNC TNC SW SoundCard AX.25 INTERNET KISS Interface HDLC RADIO DATA FM TCP AFSK D to A HOST IN RF OS IP NET VPN CONNECTION MAC Audio Audio Radio 3/23/2018 TNC Interfacing Tutorial 3 TNC Connection Overview TNC Implementation Types Hardware Radio DATA Jack Specific Interface Examples 3/23/2018 TNC Interfacing Tutorial 4 TNC Implementation Summary • Multiple implementation options exist • Hardware TNC Ground Station • Software TNC + Sound Card • Software Defined Radio Receiver • Software Defined Radio Transceiver • Hybrid SDR RX / HW Radio TX implementations 3/23/2018 TNC Interfacing Tutorial 5 Hardware Radios – Common for Satellite 3/23/2018 TNC Interfacing Tutorial 6 Hardware TNCs 3/23/2018 TNC Interfacing Tutorial 7 Radio Sound Card Interfaces • Good ones offer optical isolation (optocouplers).
    [Show full text]
  • Construcción De Routers Inalámbricos Para Monitorizar Calidad De Servicio
    Facultad de Ingenier´ıa - Universidad de la Republica´ Proyecto de grado Construcci´onde routers inal´ambricos para monitorizar calidad de servicio Autores: Supervisores: Johnatan Stanley Galli Mat´ıasRichart Guti´errez Nicol´asSantiago Puppo Perna Eduardo Gramp´ın Castro Instituto de Computaci´on 9 de julio de 2015 “Confine yourself to observing and you always miss the point of your life. The object can be stated this way: Live the best life you can. Life is a game whose rules you learn if you leap into it and play it to the hilt. Otherwise, you are caught off balance, continually surprised by the shifting play. Non-players often whine and complain that luck always passes them by. They refuse to see that they can create some of their own luck. Darwi Odrade - Chapterhouse: Dune" Frank Herbert (\Lim´ıtatea observar y siempre perder´asel sentido de tu vida. Se puede poner de esta manera: Vive la mejor vida que puedas. La vida es un juego cuyas reglas aprendes si saltas a ella y la juegas a fondo. De lo contrario, te encontrar´asen una inestabilidad constante, sorprendi´endote continuamente de los cambios del juego. Quienes no juegan, a menudo se quejan de que la suerte les pasa por al lado. Se niegan a ver que pueden crear un poco de su propia suerte. Darwi Odrade - Dune: Casa Capitular") Resumen Las redes inal´ambricas 802.11, conocidas com´unmente como redes \Wi-Fi", se enfrentan a una gran variedad de problemas de se~naly cobertura. En este proyecto se construye una herramienta que monitorea las redes inal´ambricas, brindando diversa informaci´onde las mismas, teniendo como objetivos centrales entender sus problemas y analizar su funcionamiento, permitiendo lograr una mejor planificaci´on.
    [Show full text]