Diploma degree in Computer Engineering
MSc degree in Information and Communication Systems Security
Security of Information Systems and Networks
Machine learning
Software Engineering
Abstract
In fish farms a major issue is the net cage wear, resulting in fish escapes and negative impact of fish quality, due to holes and biofouling of the nets. To minimize fish losses, fisheries utilize divers to inspect net cages on a weekly basis. Aquaculture companies are looking for ways to maximize profit and reduce maintenance costs is one of them. Kefalonia Fisheries spend 250 thousand euros yearly on diver expenses for net cages maintenance. This work is about the design, fabrication, and control of an inexpensive autonomous underwater vehicle intended for inspection in net cages at Kefalonia Fisheries S.A. in Greece. Its main body is 3D-printed, and its eight-thruster configuration grants it six degrees of freedom. The main objective of the vehicle is to limit maintenance costs by increasing inspection frequency. The design, fabrication as well as the electronics and software architecture of the vehicle are presented. In addition, the forces affecting Kalypso, mobility realization, navigation, and modeling are quoted along with a flow simulation and the experimental results. The proposed design is adaptable and durable while remaining cost effective, and it can be used for both manual and automatic operations.
Abstract
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI) in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network’s nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided.We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.