Security in wireless ad-hoc networks - A survey

Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there are two pillars that cannot be overlooked: security and privacy. Both properties are especially relevant if we focus on ad-hoc wireless networks, where devices are required to cooperate - e.g.

SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.

Motivated by the upcoming Internet of Things, designing light-weight authentication protocols for resource constrained devices is among the main research directions of the last decade. Current solutions in the literature attempt either to improve the computational efficiency of cryptographic authentication schemes, or to build a provably-secure scheme relying on the hardness of a specific mathematical problem.

TLS and GB-RAR Measurements of Vibration Frequencies and Oscillation Amplitudes of Tall Structures: An Application to Wind Towers

This article presents a methodology for the monitoring of tall structures based on the joint use of a terrestrial laser scanner (TLS), configured in line scanner mode, and a ground-based real aperture radar (GB-RAR) interferometer. The methodology provides both natural frequencies and oscillation amplitudes of tall structures. Acquisitions of the surface of the tall structure are performed by the TLS with a high sampling rate: each line scan provides an instantaneous longitudinal section.

Identification of time-varying inaccessible thermal conductance from data at the boundary

A composite specimen, made of two slabs and an interface A is heated through one of its sides S, in order to evaluate the thermal conductance H of A. The direct model consists of a system of Initial Boundary Value Problems completed by suitable transmission conditions. Thanks to the properties of multilayer diffusion, we reduce the problem to the slab between A and S only. In this case evaluating the thermal resistance of A means to identify a coefficient in a Robin boundary condition. We evaluate H numerically by means of Thin Plate Approximation.

Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN

In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. In this paper, we address the fundamental issue of quantifying to which extent secret sharing schemes, combined with nodes mobility, can help in assuring data availability and confidentiality. We provide accurate analytical results binding the fraction of the network accessed by the sink and the adversary to the amount of information they can successfully recover. Extensive simulations support our findings.

Fractional Orlicz-Sobolev embeddings

The optimal Orlicz target space is exhibited for embeddings of fractional-order Orlicz-Sobolev spaces in $R^n$. An improved embedding with an Orlicz-Lorentz target space, which is optimal in the broader class of all rearrangement-invariant spaces, is also established. Both spaces of order s in (0, 1), and higher-order spaces are considered. Related Hardy type inequalities are proposed as well.