Spring 2018
ENSC 835: COMMUNICATION NETWORKS

FINAL PROJECTS:


  • 1. Ashraful Bari Chowdhury and Songhe Lei
        (abchowdh at sfu.ca, songhel at sfu.ca)

    UAV Network Simulation Using Zigbee Protocol

    Abstract:
    Unmanned Aerial Vehicles (UAVs) have been developing and becoming prevalent in various fields or disciplines in current world. Meanwhile, the effective tactics to control and monitor UAVs is an increasingly important topic for research. In our project, the proposed idea is based on Zigbee protocol that can be implemented on any air vehicle by using Zigbee Wireless Sensors that are low cost, low power, reliable and secure to control and monitor the internal and external functions of the air vehicles. Various UAV network scenarios are simulated with Riverbed Modeler(OPNET) to demonstrate network performance, as well as pros and cons of using Zigbee protocol.

    References:
    [1] Sewoong Min; Haewoon Nam, "A formation flight control of UAVs using ZigBee", Ubiquitous Robots and Ambient Intelligence (URAI), 2016 13th International Conference.
    [2] A. Alfredsen, T. A. Johansen and K. R. SkØien A. Zolich, "A communication bridge between underwater sensors and unmanned vehicles using a surface wireless sensor network - design and validation," in OCEANS 2016, Shanghai, 2016, pp. 1-9.
    [3] S. Hamoodi et al, 'Comprehensive Performance Study of OPNET Modeler For ZigBee Wireless Sensor Network' ,2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies. [On-line]. 3, pp. 357-362.
    [4] Tristancho, C. Barrado, S. P. Mansilla, and E. Pastor, "A telemetry modeling for intelligent UAV monitoring," in 2009 IEEE/AIAA 28th Digital Avionics Systems Conference, Orlando, 2009, pp. 7.C.1-1-7.C.1-4.
    [5] Khusvinder Gill, Shuang-Hua Yang, Fang Yao, Xin Lu, “A zigbee-based home automation system”, IEEE Transactions on Consumer Electronics, Volume: 55, Issue: 2, May 2009.


  • 2. Ahmed, Haris Ahmed and Faisal Ahmed (Faisal) Miaze
        (haa39 at sfu.ca, fmiaze at sfu.ca)

    On the viability of 4K-Cloud Gaming on Wi-Fi

    Abstract:
    Over the past decade, we’ve seen cloud gaming turn increasingly ubiquitous thanks to the proliferation of high-speed networks & cloud computing [2]. Cloud now allows games to be played over multiple devices. It has brought a paradigm shift in the way games are distributed as digital copies. We can now rent games-on-demand without being worried about the memory usage in our systems. Sony’s PS Now & Nvidia’s GeForce Now already offer their subscribers a limited library of popular games at 1080p 60fps.

    Using Riverbed Modeler tools, we design a network configuration to study various scenarios to identify the feasibility of game streaming in 4K over Wi-Fi.

    References:
    [1] R. Shea, J. Liu, E. Ngai, and Y. Cui, "Cloud Gaming: Architecture & Performance", IEEE Network, pp. 16-21, 2013.
    [2] W. Cai, R. Shea, C. Huang, K. Chen, J. Liu, V. Leung and C. Hsu, "A Survey on Cloud Gaming: Future of Computer Games", IEEE Access, vol. 4, pp. 7605-7620, 2016.
    [3] D. Chan, "On the feasibility of video gaming on demand in wireless LAN/WiMAX". [Online]. Available: http://www2.ensc.sfu.ca/~ljilja/ENSC895/Projects/chan/vgod_report.pdf. [Accessed: 10- Feb- 2018]
    [4] S. Abdulazeez, A. Rhalibi and D. Jumeily, "Simulation of Massively Online Games Communication Using OPNET Custom Application", ISCC, 2016.
    [5] L. Royyala, "Cloud Gaming Simulation". [Online]. Available: https://sites.google.com/view/cloudgamingproject. [Accessed: 10- Feb- 2018].


  • 3. Prerna (Prerna) Batta
        (pbatta at sfu.ca)

    Network applications of SDN using Mininet

    Abstract:
    Software Defined Networks (SDN) is a process where the control is moved out of the individual network nodes and into the separate centralized controller. Hence, the controller can exploit complete knowledge of the network to optimize flow management as well as support the user requirements. In this project a custom network topology is created in Mininet by using a centralized SDN controller. The aim of this project is to demonstrate different capabilities of SDN by implementing SDN switch as a hub and as a Firewall.

    References:
    [1] R. Palamand, "Construction of a Simplified Software Defined Networking (SDN) Test-Bed," Intl. Journal of Applied Engineering Research, Vol. 10, No. 18, ISSN 0973-4562, 2015.
    [2] Masoudi and A. Ghaffari, "Software defined networks: A survey," J. Network and Computer Applications, vol. 67, pp. 1-25, May 2016.
    [3] Keti and S. Askar, "Emulation of Software Defined Networks Using Mininet in Different Simulation Environments," IEEE 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 205-210, Feb 2015
    [4] Mininet: An Instant Virtual Network on Your Laptop (or Other PC) [online]. Available: http://www.mininet.org/ (Links to an external site.)Links to an external site..
    [5] Isaia and L. Guan, "Distributed Mininet placement algorithm for fat-tree topologies," 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1-6, Oct. 2017.


  • 4. Aaditya Vasan Srinivasan
        (asriniva at sfu.ca)

    Simulation and Analysis of Sybil Attack in MANET

    Abstract:
    Mobile Ad hoc Network(MANET) is a wireless connection of self configuring, infrastructure-less network of mobile devices. MANETs can be exploited with several cyber attack methods, compromising the security of the nodes within the network. Sybil attack is one of the serious threats when it comes to Wireless networks. The Attacker can make a node illegitimately claim multiple identities with identity theft, misleading other nodes by showing wrong/duplicate ID. The attack is named after a case study of a woman diagnosed with dissociative identity disorder. In this project simulation we will implement the sybil attack on Mobile Ad hoc Network and study its effects.

    References:
    [1] J. Newsome, E. Shi, D. Song and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004, 2004, pp. 259-268. doi: 10.1109/IPSN.2004.1307346
    [2] G. Guette and B. Ducourthial, "On the Sybil attack detection in VANET," 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, 2007, pp. 1-6. doi: 10.1109/MOBHOC.2007.4428742
    [3] C. Piro, C. Shields and B. N. Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," 2006 Securecomm and Workshops, Baltimore, MD, 2006, pp. 1-11. doi: 10.1109/SECCOMW.2006.359558
    [4] Z. Kasiran and J. Mohamad, "Throughput performance analysis of the wormhole and sybil attack in AODV," 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), Bangkok, 2014, pp. 81-84. doi: 10.1109/DICTAP.2014.6821661
    [5] Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, Feb. 2006. doi: 10.1109/JSAC.2005.861382


    Last modified: Thu Apr 5 23:41:17 PDT 2018.