SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a ph... more Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local...
SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), 2000
Abstract: Planning of complex activities is a deliberative process and automation support for re-... more Abstract: Planning of complex activities is a deliberative process and automation support for re-planning activities should provide for cognitive modeling of the planning process, This paper takes the position that the cognitive model should contain details of the domain being supported and, especially for support of on-line re-planning, knowledge of the system implementation architecture-including performance modeling of the implementation architecture, We discuss these thoughts in some detail and provide an overview of a test ...
John R. James, John-James@ usma. edu, John Marin, Paul Manz Daniel Ragsdale, John Surdu, Wayne Sc... more John R. James, John-James@ usma. edu, John Marin, Paul Manz Daniel Ragsdale, John Surdu, Wayne Schepens, Office of the Program Manager Timothy Presby Field Artillery Tactical Data System United States Military Academy, West Point, NY Fort Monmouth, NJ Keywords: network, distributed, fixed, mobile, latency
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a ph... more Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local...
SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), 2000
Abstract: Planning of complex activities is a deliberative process and automation support for re-... more Abstract: Planning of complex activities is a deliberative process and automation support for re-planning activities should provide for cognitive modeling of the planning process, This paper takes the position that the cognitive model should contain details of the domain being supported and, especially for support of on-line re-planning, knowledge of the system implementation architecture-including performance modeling of the implementation architecture, We discuss these thoughts in some detail and provide an overview of a test ...
John R. James, John-James@ usma. edu, John Marin, Paul Manz Daniel Ragsdale, John Surdu, Wayne Sc... more John R. James, John-James@ usma. edu, John Marin, Paul Manz Daniel Ragsdale, John Surdu, Wayne Schepens, Office of the Program Manager Timothy Presby Field Artillery Tactical Data System United States Military Academy, West Point, NY Fort Monmouth, NJ Keywords: network, distributed, fixed, mobile, latency
Uploads
Papers by John James