Scholarship & Research
Permanent URI for this communityhttps://scholarworks.montana.edu/handle/1/1
Browse
2 results
Search Results
Item Location-preserved contention-based routing in vehicular ad hoc networks(Wiley, 2014-04) Qing, Yang; Lim, Alvin; Ruan, Xiaojun; Qin, Xiao; Kim, DongjinLocation privacy protection in vehicular ad hoc networks considers preserving two types of information: the locations and identifications of users. However, existing solutions, which either replace identifications by pseudonyms or hide locations in areas, cannot be directly applied to geographic routing protocols because they degrade network performance. To address this issue, we proposed a location-preserved contention (LPC) based routing protocol, in which greedy forwarding is achieved using dummy distance to the destination information instead of users’ true locations. Unlike the contention-based forwarding protocol, the number of duplicated responses in LPC can be reduced by adjusting the parameter α, which is a timer scaling factor. To quantify the efficiency of location privacy protection, an entropy-based analytical method is proposed. LPC is compared with existing routing and location privacy protection protocols in simulations. Results show that LPC provides 11.7% better network performance and a higher level of location privacy protection than the second best protocol.Item ES-MPICH2: A Message Passing Interface with Enhanced Security(IEEE, 2012-01) Ruan, Xiaojun; Yang, Qing; Alghamdi, Mohammed I.; Yin, Shu; Qin, XiaoAn increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat to security sensitive parallel applications running on the clusters. To address this security issue, we developed a Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network. We focus on M PI rather than other protocols, because M PI is one of the most popular communication protocols for parallel computing on clusters. Our MPI implementation-called ES-MPICH2-was built based on MPICH2 developed by the Argonne National Laboratory. Like MPICH2, ES-MPICH2 aims at supporting a large variety of computation and communication platforms like commodity clusters and high-speed networks. We integrated encryption and decryption algorithms into the MPICH2 library with the standard MPI interface and; thus, data confidentiality of MPI applications can be readily preserved without a need to change the source codes of the MPI applications. MPI-application programmers can fully configure any confidentiality services in MPICHI2, because a secured configuration file in ES-MPICH2 offers the programmers flexibility in choosing any cryptographic schemes and keys seamlessly incorporated in ES-MPICH2. We used the Sandia Micro Benchmark and Intel MPI Benchmark suites to evaluate and compare the performance of ES-MPICH2 with the original MPICH2 version. Our experiments show that overhead incurred by the confidentiality services in ES-MPICH2 is marginal for small messages. The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high-performance clusters. The executable binaries and source code of the ES-MPICH2 implementation are freely available at http:// www.eng.auburn.edu/~xqin/software/es-mpich2/.