Skip to main content

ASU Electronic Theses and Dissertations


This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.


Mime Type
Date Range
2012 2019


Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) …

Contributors
Buduru, Arun Balaji, Yau, Sik-Sang, Ahn, Gail-Joon, et al.
Created Date
2016

Internet of Things (IoT) is emerging as part of the infrastructures for advancing a large variety of applications involving connections of many intelligent devices, leading to smart communities. Due to the severe limitation of the computing resources of IoT devices, it is common to offload tasks of various applications requiring substantial computing resources to computing systems with sufficient computing resources, such as servers, cloud systems, and/or data centers for processing. However, this offloading method suffers from both high latency and network congestion in the IoT infrastructures. Recently edge computing has emerged to reduce the negative impacts of tasks offloading to …

Contributors
Song, Yaozhong, Yau, Sik-Sang, Huang, Dijiang, et al.
Created Date
2018

With internet traffic being bursty in nature, Dynamic Bandwidth Allocation(DBA) Algorithms have always been very important for any broadband access network to utilize the available bandwidth effciently. It is no different for Passive Optical Networks(PON), which are networks based on fiber optics in the physical layer of TCP/IP stack or OSI model, which in turn increases the bandwidth in the upper layers. The work in this thesis covers general description of basic DBA Schemes and mathematical derivations that have been established in research. We introduce a Novel Survey Topology that classifes DBA schemes based on their functionality. The novel perspective …

Contributors
Mercian, Anu, Reisslein, Martin, Mcgarry, Michael, et al.
Created Date
2012

Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research. To thoroughly study on this topic, the presented work approaches it from an attacker's perspective. Under a perfect scenario, all the traffic in a targeted MANET …

Contributors
Li, Bing, Huang, Dijiang, Xue, Guoliang, et al.
Created Date
2016

The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different control algorithms. The focus of this thesis is to design scheduling and power control algorithms in wireless networks, and analyze their performances. In this thesis, we first study the multicast capacity of wireless ad hoc networks. Gupta and Kumar studied the scaling law of the unicast capacity of wireless ad hoc networks. They derived …

Contributors
Zhou, Shan, Ying, Lei, Zhang, Yanchao, et al.
Created Date
2013

A Fiber-Wireless (FiWi) network integrates a passive optical network (PON) with wireless mesh networks (WMNs) to provide high speed backhaul via the PON while offering the flexibility and mobility of a WMN. Generally, increasing the size of a WMN leads to higher wireless interference and longer packet delays. The partitioning of a large WMN into several smaller WMN clusters, whereby each cluster is served by an Optical Network Unit (ONU) of the PON, is examined. Existing WMN throughput-delay analysis techniques considering the mean load of the nodes at a given hop distance from a gateway (ONU) are unsuitable for the …

Contributors
Chen, Po-Yen, Reisslein, Martin, Seeling, Patrick, et al.
Created Date
2015

Emerging modular cable network architectures distribute some cable headend functions to remote nodes that are located close to the broadcast cable links reaching the cable modems (CMs) in the subscriber homes and businesses. In the Remote- PHY (R-PHY) architecture, a Remote PHY Device (RPD) conducts the physical layer processing for the analog cable transmissions, while the headend runs the DOCSIS medium access control (MAC) for the upstream transmissions of the distributed CMs over the shared cable link. In contrast, in the Remote MACPHY (R-MACPHY) ar- chitecture, a Remote MACPHY Device (RMD) conducts both the physical and MAC layer processing. The …

Contributors
Alharbi, Ziyad Ghazai, Reisslein, Martin, Thyagaturu, Akhilesh, et al.
Created Date
2019

Data centers connect a larger number of servers requiring IO and switches with low power and delay. Virtualization of IO and network is crucial for these servers, which run virtual processes for computing, storage, and apps. We propose using the PCI Express (PCIe) protocol and a new PCIe switch fabric for IO and switch virtualization. The switch fabric has little data buffering, allowing up to 512 physical 10 Gb/s PCIe2.0 lanes to be connected via a switch fabric. The switch is scalable with adapters running multiple adaptation protocols, such as Ethernet over PCIe, PCIe over Internet, or FibreChannel over Ethernet. …

Contributors
Luo, Haojun, Hui, Joseph, Song, Hongjiang, et al.
Created Date
2013

The integration of passive optical networks (PONs) and wireless mesh networks (WMNs) into Fiber-Wireless (FiWi) networks has recently emerged as a promising strategy for providing flexible network services at relative high transmission rates. This work investigates the effectiveness of localized routing that prioritizes transmissions over the local gateway to the optical network and avoids wireless packet transmissions in radio zones that do not contain the packet source or destination. Existing routing schemes for FiWi networks consider mainly hop-count and delay metrics over a flat WMN node topology and do not specifically prioritize the local network structure. The combination of clustered …

Contributors
Dashti, Yousef, Reisslein, Martin, Zhang, Yanchao, et al.
Created Date
2016

Video capture, storage, and distribution in wireless video sensor networks (WVSNs) critically depends on the resources of the nodes forming the sensor networks. In the era of big data, Internet of Things (IoT), and distributed demand and solutions, there is a need for multi-dimensional data to be part of the Sensor Network data that is easily accessible and consumable by humanity as well as machinery. Images and video are expected to become as ubiquitous as is the scalar data in traditional sensor networks. The inception of video-streaming over the Internet, heralded a relentless research for effective ways of distributing video …

Contributors
Seema, Adolph, Reisslein, Martin, Kitchen, Jennifer, et al.
Created Date
2017

The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, …

Contributors
Tu, Huahong, Doupé, Adam, Ahn, Gail-Joon, et al.
Created Date
2017

Data privacy is emerging as one of the most serious concerns of big data analytics, particularly with the growing use of personal data and the ever-improving capability of data analysis. This dissertation first investigates the relation between different privacy notions, and then puts the main focus on developing economic foundations for a market model of trading private data. The first part characterizes differential privacy, identifiability and mutual-information privacy by their privacy--distortion functions, which is the optimal achievable privacy level as a function of the maximum allowable distortion. The results show that these notions are fundamentally related and exhibit certain consistency: …

Contributors
Wang, Weina, Ying, Lei, Zhang, Junshan, et al.
Created Date
2016

The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In the meantime, there are emerging demands for new types of authentication. Proximity authentication is an example, which is not needed for computers but quite necessary for smart devices. These challenges motivate me to study and develop novel authentication mechanisms specific for smart devices. In this dissertation, I am interested in …

Contributors
Li, Lingjun, Xue, Guoliang, Ahn, Gail-Joon, et al.
Created Date
2014

The explosive growth of data generated from different services has opened a new vein of research commonly called ``big data.'' The sheer volume of the information in this data has yielded new applications in a wide range of fields, but the difficulties inherent in processing the enormous amount of data, as well as the rate at which it is generated, also give rise to significant challenges. In particular, processing, modeling, and understanding the structure of online social networks is computationally difficult due to these challenges. The goal of this study is twofold: first to present a new networked data processing …

Contributors
Proulx, Brian Benjamin, Zhang, Junshan, Cochran, Douglas, et al.
Created Date
2015

LTE (Long Term Evolution) represents an emerging technology that will change how service providers backhaul user traffic to their infrastructure over IP networks. To support growing mobile bandwidth demand, an EPON backhaul infrastructure will make possible realtime high bandwidth applications. LTE backhaul planning and deployment scenarios are important factors to network success. In this thesis, we are going to study the effect of LTE backhaul on Optical network, in an attempt to interoperate Fiber and Wireless networks. This project is based on traffic forecast for the LTE networks. Traffic models are studied and gathered from literature to reflect applications accurately. …

Contributors
Alharbi, Ziyad, Reisslein, Martin, Zhang, Yanchao, et al.
Created Date
2014

Access Networks provide the backbone to the Internet connecting the end-users to the core network thus forming the most important segment for connectivity. Access Networks have multiple physical layer medium ranging from fiber cables, to DSL links and Wireless nodes, creating practically-used hybrid access networks. We explore the hybrid access network at the Medium ACcess (MAC) Layer which receives packets segregated as data and control packets, thus providing the needed decoupling of data and control plane. We utilize the Software Defined Networking (SDN) principle of centralized processing with segregated data and control plane to further extend the usability of our …

Contributors
Mercian, Anu, Reisslein, Martin, McGarry, Michael P, et al.
Created Date
2015

Air pollution is one of the biggest challenges people face today. It is closely related to people's health condition. The agencies set up standards to regulate the air pollution. However, many of the pollutants under the regulation level may still result in adverse health effect. On the other hand, it is not clear the exact mechanism of air pollutants and its health effect. So it is difficult for the health centers to advise people how to prevent the air pollutant related diseases. It is of vital importance for both the agencies and the health centers to have a better understanding …

Contributors
Wang, Rui, Tao, Nongjian, Forzani, Erica, et al.
Created Date
2012

A Virtual Private Network (VPN) is the traditional approach for an end-to-end secure connection between two endpoints. Most existing VPN solutions are intended for wired networks with reliable connections. In a mobile environment, network connections are less reliable and devices experience intermittent network disconnections due to either switching from one network to another or experiencing a gap in coverage during roaming. These disruptive events affects traditional VPN performance, resulting in possible termination of applications, data loss, and reduced productivity. Mobile VPNs bridge the gap between what users and applications expect from a wired network and the realities of mobile computing. …

Contributors
Alshalan, Abdullah O., Huang, Dijiang, Ahn, Gail-Joon, et al.
Created Date
2017

The cyber-physical systems (CPS) are emerging as the underpinning technology for major industries in the 21-th century. This dissertation is focused on two fundamental issues in cyber-physical systems: network interdependence and information dynamics. It consists of the following two main thrusts. The first thrust is targeted at understanding the impact of network interdependence. It is shown that a cyber-physical system built upon multiple interdependent networks are more vulnerable to attacks since node failures in one network may result in failures in the other network, causing a cascade of failures that would potentially lead to the collapse of the entire infrastructure. …

Contributors
Qian, Dajun, Zhang, Junshan, Ying, Lei, et al.
Created Date
2012

The purpose of this paper is to introduce a new method of dividing wireless communication (such as the 802.11a/b/g/n and cellular UMTS MAC protocols) across multiple unreliable communication links (such as Ethernet). The purpose is to introduce the appropriate hardware, software, and system architecture required to provide the basis for a wireless system (using a 802.11a/b/g/n and cellular protocols as a model) that can scale to support thousands of users simultaneously (say in a large office building, super chain store, etc.) or in a small, but very dense communication RF region. Elements of communication between a base station and a …

Contributors
James, Frank Lee, Reisslein, Martin, Ying, Lei, et al.
Created Date
2014

A new type of Ethernet switch based on the PCI Express switching fabric is being presented. The switch leverages PCI Express peer-to-peer communication protocol to implement high performance Ethernet packet switching. The advantages and challenges of using the PCI Express as the switching fabric are addressed. The PCI Express is a high-speed short-distance communication protocol largely used in motherboard-level interconnects. The total bandwidth of a PCI Express 3.0 link can reach as high as 256 gigabit per second (Gb/s) per 16 lanes. Concerns for PCI Express such as buffer speed, address mapping, Quality of Service and power consumption need to …

Contributors
Chen, Caiyi, Hui, Joseph, Reisslein, Martin, et al.
Created Date
2012

LTE-Advanced networks employ random access based on preambles transmitted according to multi-channel slotted Aloha principles. The random access is controlled through a limit <italic>W</italic> on the number of transmission attempts and a timeout period for uniform backoff after a collision. We model the LTE-Advanced random access system by formulating the equilibrium condition for the ratio of the number of requests successful within the permitted number of transmission attempts to those successful in one attempt. We prove that for <italic>W</italic>&le;8 there is only one equilibrium operating point and for <italic>W</italic>&ge;9 there are three operating points if the request load &rho; is …

Contributors
Tyagi, Revak Raj, Reisslein, Martin, Tepedelenlioglu, Cihan, et al.
Created Date
2014

Software-Defined Networking (SDN) is an emerging network paradigm that decouples the control plane from the data plane, which allows network administrators to consolidate common network services into a centralized module named SDN controller. Applications’ policies are transformed into standardized network rules in the data plane via SDN controller. Even though this centralization brings a great flexibility and programmability to the network, network rules generated by SDN applications cannot be trusted because there may exist malicious SDN applications, and insecure network flows can be made due to complex relations across network rules. In this dissertation, I investigate how to identify and …

Contributors
Han, Wonkyu, Ahn, Gail-Joon, Zhao, Ziming, et al.
Created Date
2016

Cloud computing is known as a new and powerful computing paradigm. This new generation of network computing model delivers both software and hardware as on-demand resources and various services over the Internet. However, the security concerns prevent users from adopting the cloud-based solutions to fulfill the IT requirement for many business critical computing. Due to the resource-sharing and multi-tenant nature of cloud-based solutions, cloud security is especially the most concern in the Infrastructure as a Service (IaaS). It has been attracting a lot of research and development effort in the past few years. Virtualization is the main technology of cloud …

Contributors
Chung, Chun-Jen, Huang, Dijiang, Ahn, Gail-Joon, et al.
Created Date
2015

Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due to its massive user engagement and structural openness. Although existed, little is still known in the community about new types of vulnerabilities in current microblogging services which could be leveraged by the intelligence-evolving attackers, and more importantly, the corresponding defenses that could prevent both the users and the microblogging service …

Contributors
Zhang, Jinxue, Zhang, Yanchao, Zhang, Junshan, et al.
Created Date
2016

Dynamic spectrum access (DSA) has great potential to address worldwide spectrum shortage by enhancing spectrum efficiency. It allows unlicensed secondary users to access the under-utilized spectrum when the primary users are not transmitting. On the other hand, the open wireless medium subjects DSA systems to various security and privacy issues, which might hinder the practical deployment. This dissertation consists of two parts to discuss the potential challenges and solutions. The first part consists of three chapters, with a focus on secondary-user authentication. Chapter One gives an overview of the challenges and existing solutions in spectrum-misuse detection. Chapter Two presents SpecGuard, …

Contributors
Jin, Xiaocong, Zhang, Yanchao, Zhang, Junshan, et al.
Created Date
2017

The rapid advances in wireless communications and networking have given rise to a number of emerging heterogeneous wireless and mobile networks along with novel networking paradigms, including wireless sensor networks, mobile crowdsourcing, and mobile social networking. While offering promising solutions to a wide range of new applications, their widespread adoption and large-scale deployment are often hindered by people's concerns about the security, user privacy, or both. In this dissertation, we aim to address a number of challenging security and privacy issues in heterogeneous wireless and mobile networks in an attempt to foster their widespread adoption. Our contributions are mainly fivefold. …

Contributors
Zhang, Rui, Zhang, Yanchao, Duman, Tolga Mete, et al.
Created Date
2013

Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, …

Contributors
Sun, Jingchao, Zhang, Yanchao, Zhang, Junshan, et al.
Created Date
2017

Mobile devices have penetrated into every aspect of modern world. For one thing, they are becoming ubiquitous in daily life. For the other thing, they are storing more and more data, including sensitive data. Therefore, security and privacy of mobile devices are indispensable. This dissertation consists of five parts: two authentication schemes, two attacks, and one countermeasure related to security and privacy of mobile devices. Specifically, in Chapter 1, I give an overview the challenges and existing solutions in these areas. In Chapter 2, a novel authentication scheme is presented, which is based on a user’s tapping or sliding on …

Contributors
Chen, Yimin, Zhang, Yanchao, Zhang, Junshan, et al.
Created Date
2018

This thesis proposes a policy to control the heating, ventilation and air conditioning (HVAC) systems in an industrial building. The policy designed in this thesis aims to minimize the electricity cost of a building while maintaining human comfort. Occupancy prediction and building thermal dynamics are utilized in the policy. Because every building has a power constraint, the policy balances different rooms' electricity needs and electricity price to allocate AC unit power for each room. In particular, energy costs are saved by reducing the system's power for times when the occupancy is low. Human comfort is preserved by restricting the temperature …

Contributors
Li, Yangjun, Zhang, Junshan, Zhang, Yanchao, et al.
Created Date
2017

Windows based mobile application for m-health and environmental monitoring sensor devices were developed and tested. With the number of smartphone users exponentially increasing, the applications developed for m-health and environmental monitoring devices are easy to reach the general public, if the applications are simple, user-friendly and personalized. The sensing device uses Bluetooth to communicate with the smartphone, providing mobility to the user. Since the device is small and hand-held, the user can put his smartphone in his pocket, connected to the device in his hand and can move anywhere with it. The data processing performed in the applications is verified …

Contributors
Ganesan, Srisivapriya, Tao, Nongjian, Zhang, Yanchao, et al.
Created Date
2012

Small wireless cells have the potential to overcome bottlenecks in wireless access through the sharing of spectrum resources. A novel access backhaul network architecture based on a Smart Gateway (Sm-GW) between the small cell base stations, e.g., LTE eNBs, and the conventional backhaul gateways, e.g., LTE Servicing/Packet Gateways (S/P-GWs) has been introduced to address the bottleneck. The Sm-GW flexibly schedules uplink transmissions for the eNBs. Based on software defined networking (SDN) a management mechanism that allows multiple operator to flexibly inter-operate via multiple Sm-GWs with a multitude of small cells has been proposed. This dissertation also comprehensively survey the studies …

Contributors
Thyagaturu, Akhilesh Thyagaturu, Reisslein, Martin, Seeling, Patrick, et al.
Created Date
2017

Smartphones are pervasive nowadays. They are supported by mobile platforms that allow users to download and run feature-rich mobile applications (apps). While mobile apps help users conveniently process personal data on mobile devices, they also pose security and privacy threats and put user's data at risk. Even though modern mobile platforms such as Android have integrated security mechanisms to protect users, most mechanisms do not easily adapt to user's security requirements and rapidly evolving threats. They either fail to provide sufficient intelligence for a user to make informed security decisions, or require great sophistication to configure the mechanisms for enforcing …

Contributors
Jing, Yiming, Ahn, Gail-Joon, Doupé, Adam, et al.
Created Date
2015

The commercial semiconductor industry is gearing up for 5G communications in the 28GHz and higher band. In order to maintain the same relative receiver sensitivity, a larger number of antenna elements are required; the larger number of antenna elements is, in turn, driving semiconductor development. The purpose of this paper is to introduce a new method of dividing wireless communication protocols (such as the 802.11a/b/g/n and cellular UMTS MAC protocols) across multiple unreliable communication links using a new link layer communication model in concert with a smart antenna aperture design referred to as Vector Antenna. A vector antenna is a …

Contributors
James, Frank Lee, Reisslein, Martin, Seeling, Patrick, et al.
Created Date
2019

A principal goal of this dissertation is to study wireless network design and optimization with the focus on two perspectives: 1) socially-aware mobile networking and computing; 2) security and privacy in wireless networking. Under this common theme, this dissertation can be broadly organized into three parts. The first part studies socially-aware mobile networking and computing. First, it studies random access control and power control under a social group utility maximization (SGUM) framework. The socially-aware Nash equilibria (SNEs) are derived and analyzed. Then, it studies mobile crowdsensing under an incentive mechanism that exploits social trust assisted reciprocity (STAR). The efficacy of …

Contributors
Gong, Xiaowen, Zhang, Junshan, Cochran, Douglas, et al.
Created Date
2015

Wireless sensor networks (WSN) and the communication and the security therein have been gaining further prominence in the tech-industry recently, with the emergence of the so called Internet of Things (IoT). The steps from acquiring data and making a reactive decision base on the acquired sensor measurements are complex and requires careful execution of several steps. In many of these steps there are still technological gaps to fill that are due to the fact that several primitives that are desirable in a sensor network environment are bolt on the networks as application layer functionalities, rather than built in them. For …

Contributors
Gentz, Reinhard Werner, Scaglione, Anna, Zhang, Yanchao, et al.
Created Date
2017