Micro aerial vehicles (MAVs), in particular, quadcopters, have seen increasing adoption in many application domains due to their flexible operations and versatile functions. By taking advantages of the inherent system inertia properties of the physical platform during MAV operations, satisfactory flight performance of the vehicle can be achieved despite a variety of internal and external disturbances including environment perturbations and cyber-physical attacks, provided the fault detection and control strategy is maintained with a proper lower bound of its operating frequency. From the control design perspective, such frequency bound depends heavily on the sensitivity of the system response to its dynamic properties including inertia and dynamic couplings. For a cyber-physical system, which is subject to various cyber and physical attacks, there is usually a large sensitivity difference between physical time scale and cyber time scale. With this fact, a properly designed fault-tolerant and control strategy can leverage the inertia property of the system to arrive at an optimal control frequency to save computational power while maintaining the flight performance. For many current MAVs, their control programs are usually executed at a fixed high-frequency, which provides no significant performance gains at most of the time. In this work, we perform a sensitivity analysis and quantification of the vehicle system to guide the design and optimization of customized on-board control and computational resources. By quantifying system sensitivity and its variation across different control channels (DOFs), the computational resources can be re-distributed and optimized to detect and reject cyber-physical attacks more efficiently. With the proposed method, the cyber and physical resources of the vehicle can be allocated by system demands, which can further enhance vehicle reliability and accomplish complicated security tasks. To demonstrate the effectiveness of the proposed method, we have conducted the simulated flight test with the real vehicle parameters.
We study data integrity verification in peer-to-peer media streaming for content distribution. Challenges include the timing constraint of streaming as well as the untrustworthiness of peers. We show the inadequacy of existing data integrity verification protocols, and propose Block-Oriented Probabilistic verification (BOPV), an efficient protocol utilizing message digest and probabilistic verification. We then propose Tree-based Forward Digest Protocol (TFDP) to further reduce the communication overhead. A comprehensive
comparison is presented by comparing the performance of existing protocols and our protocols, with respect to overhead, security assurance level, and packet loss tolerance. Finally, experimental results are presented to evaluate the performance of our protocols.
To distribute video and audio data in real-time streaming mode, both Content Distributed Network (CDN) based and peer-to-peer (P2P) based architectures have been proposed. However, each architecture has its limitations. CDN servers are expensive to deploy and maintain. The storage space and out-bound bandwidth allocated to each media file are
limited and incur a cost. Current solutions to lowering such cost usually compromise the media quality delivered. On the other hand, a P2P architecture needs a sufficient number of 'seed' supplying peers to 'jumpstart' the system. Compared with a CDN server, a peer offers very low out-bound bandwidth. Furthermore, it is not clear how to fairly determine the contribution of each supplying peer. In this paper, we propose a novel hybrid architecture which integrates CDN and P2P based streaming media distribution. The architecture is highly cost-effective: it significantly lowers the cost of CDN server resources, without compromising the media quality delivered. Furthermore, we propose a limited contribution policy for the supplying peers in the system, so that the streaming capacity of supplying peers is exploited on a limited and fair basis. We present an in-depth quantitative analysis of the hybrid system. The analysis is very well supported by our extensive simulation results.
With the deployment of multimedia service proxies at different locations in the networks, it is possible to create an application-level media service proxy network. Multimedia sources and clients will then be able to connect to this network, and create customized, value-added, and composite media service delivered by one or more proxies in the media service proxy network. In this paper, we focus on the problem of finding multimedia service path in the media service proxy network. Our goal is to find the best path with respect to end-to-end resource availability for each service path request. Our solution includes (1) a mechanism to monitor and propagate resource availability information in the media service proxy network and (2) an algorithm to find the best service path based on the resource monitoring results. Its main features include: (1) the resource monitoring mechanism provides reasonable accuracy and stability, while incurring controlled overhead; (2) the service path finding algorithm finds the best path for each service path request, and achieves high overall success rate among all requests; and (3) it is an application-level solution, and does not require changes to the lower-level network infrastructure.
To support real-time multimedia applications in wireless packet networks, it is an essential challenge to provide seamless quality of service (QoS) to mobile users. In this paper, we address the problem of real-time multimedia multicast in cellular networks, and present our solution to avoid large QoS fluctuations during handoffs. Specifically, during a multicast session, a mobile host may experience varying packet delay, delay jitter, and channel error when it moves from one cell to another. It is thus desirable that these location-dependent QoS parameters appear as seamless as possible to mobile hosts. We present protocols to achieve a degree of transmission synchronization among multiple cells, so that the delays and delay jitters of each packet to all subscribing mobile hosts do not vary substantially. In addition, we apply Forward Error Correction technique to recover the QoS-mandatory packets from wireless channel errors. We show through analysis and simulation that the mobile hosts will experience brief, smooth, and low packet loss rate handoffs.
KEYWORDS: Optical tracking, Control systems, Detection and tracking algorithms, Internet, Algorithm development, Fuzzy logic, Systems modeling, Algorithms, Visual process modeling, Video
In current end systems, multiple flexible, complex and distributed applications concurrently share and compete both end system resource and transmission bandwidth of heterogeneous multi-protocol networks, especially the Internet. Our objective is to enable adaptation awareness in these applications to fully cope with the dynamics in resource availability over the heterogeneous Internet, as well as fluctuations in QoS requirements of the applications themselves. In this paper, we present the theoretical and practical aspects of a Task Control Model implemented in the middleware layer, which applies control theoretical approaches to utilize measurement-based samples monitored in the network traffic, as well as resource and QoS demand dynamics observed in the end systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.