info-for-fr-2013-neha-greg.docx | |
File Size: | 20 kb |
File Type: | docx |
Above is a posted file requested by Dr. Fu and the NSF.
Wednesday, July 24th, 2013
Neha attended Mid-SURE at MSU to present the work.
Tuesday, July 23rd, 2013
Poster presentations at Oakland University.
Monday, July 22nd, 2013
Final full day of work.
Monday, July 15th, 2013 - Friday, July 19th, 2013
We spent the week hard at work, finishing to code to evaluate the performance metrics and editing the paper.
Friday, July 12th, 2013
We made malicious nodes act differently than normal nodes.
Thursday, July 11th, 2013
Greg set roles for car creation and Neha fixed issues with other parts of the code.
Wednesday, July 10th, 2013
Neha got the message passing to work, which takes each car that's not a first responder and figures out what messages to aggregate. Greg got first responders assigned.
Tuesday, July 9th, 2013
Neha completed the code needed for critical messages. Greg completed the grid timestep and following distance.
Monday, July 8th, 2013
In the morning, we had presentations and discussed our schedule for the next two weeks. We completed the data flow diagram and included it in our presentation. Later, Neha looked at how to ensure that we have taken extra steps for critical messages, while Greg looked at the grid timestep, making the vehicles move.
Friday, July 5th, 2013
Neha ensured that the decide function in the code properly identifies the vehicle who's trust value it is using and drafted a powerpoint for Monday's presentations. Greg thought about the grid some more. After we met with Jared, we talked about what to implement in the code and what to leave out further. We decided to come back to a coding of Trust Decay if we have time since memory allocation could be a 4th performance metric. Jared sent us this simulation software which we will download and try to implement: http://sumo.sourceforge.net/
Wednesday, July 3rd, 2013
Neha finished the part of the code updating the trust values, although we still need to work out how to set whether or not the message-passing vehicle was correct or not on the message they passed. Greg spent a considerable amount of time working on an error. Eventually, we ran it in Ubuntu and created a makefile, using valgrid to realize there was a Segmentation error. Finally, we discovered, with the help of another REU student, that the memory was reaching it's maximum capacity after adding about 15 vehicles. Implementing a vector data type solved this problem. We made a To-Do list of tasks remaining with the code.
Tuesday, July 2nd, 2013
In the morning, we had a guest speaker from the Computer Science department at Oakland. Greg continued looking at importing the trace data while Neha completed implementing the threshold. We had some issues with getting code to compile correctly. This issue was resolved when Neha updated to Dev-C++ 5.4.1, which was found on this site: http://sourceforge.net/projects/orwelldevcpp/?source=dlp
Neha began the part of the code that would update the trust values each vehicle has stored for other vehicles.
Monday, July 1st, 2013
In the morning, we had our presentations, which were followed by a meeting with Jared, Dr. Fu, Dr. Shu, and another REU group here that is working with simulations. Dr. Fu and Dr. Shu have requested that we import trace data in our codes. Also, they would like to see a data flow diagram describing our simulation. Greg worked on that while Neha continued working on the threshold implementation.
Friday, June 28th, 2013
We prepared a presentation for Monday, that contained some basic information about our simulation plan and also our code. Then, we continued programming. Neha began the part of the .cpp file that implements the threshold.
Thursday, June 27th, 2013
More programming. Neha completed the part of the .cpp file that factors distance and first responders.
Wednesday, June 26th, 2013
More programming. Neha worked on the .cpp file and finished the portion of the code that establishes the "votes" each vehicle should receive.
Tuesday, June 25th, 2013
We continued programming. Neha looked at downloading a new software for simulations to use in place of ns-2 before leaving it to continue the math models. Greg continued yesterday's classes and started a grid for the psuedo- Manhattan Model.
Monday, June 24th, 2013
In the morning, we had presentations. Following this, Jared worked with us to compose a paper detailing our plan for the simulations that was emailed to Dr. Fu and Dr. Shu. Then, we began coding. Neha worked on putting the math models in code while Greg worked on the car and the road classes.
Friday, June 21st, 2013
We prepared a powerpoint presentation for Monday's discussion. Then, we continued looking through the code.
Thursday, June 20th, 2013
We continued studying the simulations and read an introductory paper to simulations given to us from Dr. Fu. We wrote a document detailing all of our mathematical models to this point. We discussed the research material we want to include in the journal as compared to in the Mid-Sure conference, as well the type of journal we want to submit to. Then, we wrote an abstract and formed a title for the Mid-Sure conference, which was edited by Jared, then approved by Dr. Fu; so we will register for the conference shortly.
Wednesday, June 19th, 2013
We continued studying the simulations and refined the math models further.
Tuesday, June 18th, 2013
We began studying how Minhas and Hesiri wrote their simulations to help us have an idea of how to write our own simulation.
From this source: http://gmsf.sourceforge.net/; we downloaded the source code of GMSF in their SVN repository at sourceforge.net in Ubuntu. After tweaking the code a bit, we got it to run the Manhattan model successfully and began looking at the code for that, which is in Python.
Additionally, we looked into the possibility of registering for the MID-Sure conference in July hosted by Michigan State University and discussed what information we would include for that as compared to the information we want to submit for a journal publication.
Monday, June 17th, 2013
MIDTERM PRESENTATIONS!!
Friday, June 14th, 2013
This day was spent largely just preparing for the presentation further by rehearsing it and perfecting our powerpoint presentation.
Thursday, June 13th, 2013
We spent the day making our powerpoint presentation for the Midterm presentation Monday. Additionally, we fine-tuned the mathematical explanation of our problem statement and introduction to VANET Trust the way that Dr. Shu requested before emailing it to him and Dr. Fu.
Wednesday, June 12th, 2013
Worked on further explaining the problem statement in the intro of our first draft of our paper and to increase the validity of our mathematical models to begin testing using specific performance metrics.
Tuesday, June 11th, 2013
Meeting with Dr. Shu and Dr. Fu to discuss our problem statement and novelty of our solution. Also worked on developing our ideas into mathematical and testable models.
Monday, June 10th, 2013
In the morning, we had our presentation for the group. After that, we wrote more math models for our previous ideas, put them on a powerpoint, and prepared for our meeting tomorrow with Dr. Fu and Dr. Shu.
Friday, June 7th, 2013
In the morning we approached a new idea about dealing with trust values for vehicles that are of different ordinality. Then, we formalized this idea and put it in the paper. We finalized the tree diagram and spreadsheet from earlier this week and put them on a powerpoint for the weekly meeting on Monday.
Thursday, June 6th, 2013
We spent the day organizing all of our work to this point and wording it carefully before placing it into the template for our final paper. We emailed the paper to Dr. Fu and Dr. Shu for them to look over.
Wednesday, June 5th, 2013
In the morning, we discussed some potential problems in our model and detailed the solutions in our Proposal document, which we will discuss with Jared later. After discussing, we agreed that we want to have a paper drafted by later this week.
Tuesday, June 4th, 2013
We spent the day categorizing the current works that we will be consulting in our research. We completed a tree diagram similar to the one in Golle et al, 2004, and then put each of our papers in one of the branches. We also began a spreadsheet that categorized the trust models similar to the one in Zhang et al.
Monday, June 3rd, 2013
We began the morning with an extensive presentation for Dr. Fu and Dr. Shu about our current work and progress. In the afternoon, we worked on writing a document detailing the Problem Statement and our proposal.
Friday, May 31st 2013
Starting reading the state of the art solutions that already exist and summarizing their attributes, strengths, weaknesses, similarities, and ways our model will improve on what the others fall short on. We have selected 6 total; the top three by most citations in IEEE and ACM. We prepared a presentation for Monday.
Thursday, May 30th 2013
We edited our proposal adding in specifics on how variables are calculated and describing some of our mathematical models. We also sat in on a lecture from George Corser dealing with VANET environments and how the infrastructure is organized.
Wednesday, May 29th, 2013
We presented our work so far to the whole REU group and listened to all the other teams’ presentation. The primary advice given to us was to make a more thorough literature review. We also intend to continue working on mathematical models for our ideas.
Tuesday, May 28th, 2013
A fair number of new ideas were discussed that hopefully fix issues that arose during the group presentation on Thursday. Then, Greg and Neha went to work at writing their proposals down in the running Google Document “Proposals” and making sure the details of these ideas are clearly written so that they are prepared for the discussion tomorrow morning.
Friday, May 24th, 2013
Greg and Neha researched further about key cryptography and discussed important issues relating to our current working mathematical model. Additionally we discussed further topics to investigate and started reading more sources. We completed reading pages from the book, and have a significant amount of articles to read for the weekend.
Thursday, May 23rd, 2013
Greg and Neha received more sources from Jared. Then, we worked on a Prezi for presenting to our advisor, and presented it. We were given some interesting thoughts to consider as we continue our work.
Wednesday, May 22nd, 2013
Greg and Neha worked on learning how to use TCL code for the NS-2 simulations. We used this website for details: http://www.isi.edu/nsnam/ns/tutorial/nsscript5.html
Jared also gave Greg and Neha the following website links to look at, which will be useful as we continue to code:
http://www.teunisott.com/Adv.Netw/QoS.F.02/2tcp_1node_tcl.txt
http://www.mathcs.emory.edu/~cheung/Courses/558-old/Syllabus/90-NS/trace.html
http://getch.wordpress.com/2010/11/20/manual-interpretation-of-ns2-trace-file/
We were given formerly used code in TCL, documented in our computers as vanet_trust_model files.
We discussed the mathematical modeling more in detail. Greg and Neha also worked together on a Google Document to put all of the ideas together in one place, which we then checked with Jared, and formalized the threshold concept more in detail.
Tuesday, May 21st, 2013
Our team met and finished reading the newest paper we were sent. Concluding this we worked to formalize our abstract as well as start creating our mathematical model to calculate the confidence of a message that is received.
Monday, May 20th, 2013
Our team met and discussed the articles in depth. The papers discussed were: Minhas, Umar Farooq, et al. "Towards expanded trust management for agents in vehicular ad-hoc networks." International Journal of Computational Intelligence Theory and Practice (IJCITP) 5.1 (2010)., and Chen, Chen, et al. "Secure and efficient trust opinion aggregation for vehicular ad-hoc networks." Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd. IEEE, 2010.
Multiple questions and new ideas were explored, and these initial ideas were formally and mathematically written out. Then, Neha and Greg installed VMware and Ubuntu, then installed eclipse on Ubuntu. Then, they installed Sudo apt-get and ns2 codes to look at.
Friday, May 17th 2013
The project was selected. For the weekend, we will read "Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-hoc Networks" and "Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks". We will discuss them on Monday and have a preliminary draft of our Abstract.
Wednesday, July 24th, 2013
Neha attended Mid-SURE at MSU to present the work.
Tuesday, July 23rd, 2013
Poster presentations at Oakland University.
Monday, July 22nd, 2013
Final full day of work.
Monday, July 15th, 2013 - Friday, July 19th, 2013
We spent the week hard at work, finishing to code to evaluate the performance metrics and editing the paper.
Friday, July 12th, 2013
We made malicious nodes act differently than normal nodes.
Thursday, July 11th, 2013
Greg set roles for car creation and Neha fixed issues with other parts of the code.
Wednesday, July 10th, 2013
Neha got the message passing to work, which takes each car that's not a first responder and figures out what messages to aggregate. Greg got first responders assigned.
Tuesday, July 9th, 2013
Neha completed the code needed for critical messages. Greg completed the grid timestep and following distance.
Monday, July 8th, 2013
In the morning, we had presentations and discussed our schedule for the next two weeks. We completed the data flow diagram and included it in our presentation. Later, Neha looked at how to ensure that we have taken extra steps for critical messages, while Greg looked at the grid timestep, making the vehicles move.
Friday, July 5th, 2013
Neha ensured that the decide function in the code properly identifies the vehicle who's trust value it is using and drafted a powerpoint for Monday's presentations. Greg thought about the grid some more. After we met with Jared, we talked about what to implement in the code and what to leave out further. We decided to come back to a coding of Trust Decay if we have time since memory allocation could be a 4th performance metric. Jared sent us this simulation software which we will download and try to implement: http://sumo.sourceforge.net/
Wednesday, July 3rd, 2013
Neha finished the part of the code updating the trust values, although we still need to work out how to set whether or not the message-passing vehicle was correct or not on the message they passed. Greg spent a considerable amount of time working on an error. Eventually, we ran it in Ubuntu and created a makefile, using valgrid to realize there was a Segmentation error. Finally, we discovered, with the help of another REU student, that the memory was reaching it's maximum capacity after adding about 15 vehicles. Implementing a vector data type solved this problem. We made a To-Do list of tasks remaining with the code.
Tuesday, July 2nd, 2013
In the morning, we had a guest speaker from the Computer Science department at Oakland. Greg continued looking at importing the trace data while Neha completed implementing the threshold. We had some issues with getting code to compile correctly. This issue was resolved when Neha updated to Dev-C++ 5.4.1, which was found on this site: http://sourceforge.net/projects/orwelldevcpp/?source=dlp
Neha began the part of the code that would update the trust values each vehicle has stored for other vehicles.
Monday, July 1st, 2013
In the morning, we had our presentations, which were followed by a meeting with Jared, Dr. Fu, Dr. Shu, and another REU group here that is working with simulations. Dr. Fu and Dr. Shu have requested that we import trace data in our codes. Also, they would like to see a data flow diagram describing our simulation. Greg worked on that while Neha continued working on the threshold implementation.
Friday, June 28th, 2013
We prepared a presentation for Monday, that contained some basic information about our simulation plan and also our code. Then, we continued programming. Neha began the part of the .cpp file that implements the threshold.
Thursday, June 27th, 2013
More programming. Neha completed the part of the .cpp file that factors distance and first responders.
Wednesday, June 26th, 2013
More programming. Neha worked on the .cpp file and finished the portion of the code that establishes the "votes" each vehicle should receive.
Tuesday, June 25th, 2013
We continued programming. Neha looked at downloading a new software for simulations to use in place of ns-2 before leaving it to continue the math models. Greg continued yesterday's classes and started a grid for the psuedo- Manhattan Model.
Monday, June 24th, 2013
In the morning, we had presentations. Following this, Jared worked with us to compose a paper detailing our plan for the simulations that was emailed to Dr. Fu and Dr. Shu. Then, we began coding. Neha worked on putting the math models in code while Greg worked on the car and the road classes.
Friday, June 21st, 2013
We prepared a powerpoint presentation for Monday's discussion. Then, we continued looking through the code.
Thursday, June 20th, 2013
We continued studying the simulations and read an introductory paper to simulations given to us from Dr. Fu. We wrote a document detailing all of our mathematical models to this point. We discussed the research material we want to include in the journal as compared to in the Mid-Sure conference, as well the type of journal we want to submit to. Then, we wrote an abstract and formed a title for the Mid-Sure conference, which was edited by Jared, then approved by Dr. Fu; so we will register for the conference shortly.
Wednesday, June 19th, 2013
We continued studying the simulations and refined the math models further.
Tuesday, June 18th, 2013
We began studying how Minhas and Hesiri wrote their simulations to help us have an idea of how to write our own simulation.
From this source: http://gmsf.sourceforge.net/; we downloaded the source code of GMSF in their SVN repository at sourceforge.net in Ubuntu. After tweaking the code a bit, we got it to run the Manhattan model successfully and began looking at the code for that, which is in Python.
Additionally, we looked into the possibility of registering for the MID-Sure conference in July hosted by Michigan State University and discussed what information we would include for that as compared to the information we want to submit for a journal publication.
Monday, June 17th, 2013
MIDTERM PRESENTATIONS!!
Friday, June 14th, 2013
This day was spent largely just preparing for the presentation further by rehearsing it and perfecting our powerpoint presentation.
Thursday, June 13th, 2013
We spent the day making our powerpoint presentation for the Midterm presentation Monday. Additionally, we fine-tuned the mathematical explanation of our problem statement and introduction to VANET Trust the way that Dr. Shu requested before emailing it to him and Dr. Fu.
Wednesday, June 12th, 2013
Worked on further explaining the problem statement in the intro of our first draft of our paper and to increase the validity of our mathematical models to begin testing using specific performance metrics.
Tuesday, June 11th, 2013
Meeting with Dr. Shu and Dr. Fu to discuss our problem statement and novelty of our solution. Also worked on developing our ideas into mathematical and testable models.
Monday, June 10th, 2013
In the morning, we had our presentation for the group. After that, we wrote more math models for our previous ideas, put them on a powerpoint, and prepared for our meeting tomorrow with Dr. Fu and Dr. Shu.
Friday, June 7th, 2013
In the morning we approached a new idea about dealing with trust values for vehicles that are of different ordinality. Then, we formalized this idea and put it in the paper. We finalized the tree diagram and spreadsheet from earlier this week and put them on a powerpoint for the weekly meeting on Monday.
Thursday, June 6th, 2013
We spent the day organizing all of our work to this point and wording it carefully before placing it into the template for our final paper. We emailed the paper to Dr. Fu and Dr. Shu for them to look over.
Wednesday, June 5th, 2013
In the morning, we discussed some potential problems in our model and detailed the solutions in our Proposal document, which we will discuss with Jared later. After discussing, we agreed that we want to have a paper drafted by later this week.
Tuesday, June 4th, 2013
We spent the day categorizing the current works that we will be consulting in our research. We completed a tree diagram similar to the one in Golle et al, 2004, and then put each of our papers in one of the branches. We also began a spreadsheet that categorized the trust models similar to the one in Zhang et al.
Monday, June 3rd, 2013
We began the morning with an extensive presentation for Dr. Fu and Dr. Shu about our current work and progress. In the afternoon, we worked on writing a document detailing the Problem Statement and our proposal.
Friday, May 31st 2013
Starting reading the state of the art solutions that already exist and summarizing their attributes, strengths, weaknesses, similarities, and ways our model will improve on what the others fall short on. We have selected 6 total; the top three by most citations in IEEE and ACM. We prepared a presentation for Monday.
Thursday, May 30th 2013
We edited our proposal adding in specifics on how variables are calculated and describing some of our mathematical models. We also sat in on a lecture from George Corser dealing with VANET environments and how the infrastructure is organized.
Wednesday, May 29th, 2013
We presented our work so far to the whole REU group and listened to all the other teams’ presentation. The primary advice given to us was to make a more thorough literature review. We also intend to continue working on mathematical models for our ideas.
Tuesday, May 28th, 2013
A fair number of new ideas were discussed that hopefully fix issues that arose during the group presentation on Thursday. Then, Greg and Neha went to work at writing their proposals down in the running Google Document “Proposals” and making sure the details of these ideas are clearly written so that they are prepared for the discussion tomorrow morning.
Friday, May 24th, 2013
Greg and Neha researched further about key cryptography and discussed important issues relating to our current working mathematical model. Additionally we discussed further topics to investigate and started reading more sources. We completed reading pages from the book, and have a significant amount of articles to read for the weekend.
Thursday, May 23rd, 2013
Greg and Neha received more sources from Jared. Then, we worked on a Prezi for presenting to our advisor, and presented it. We were given some interesting thoughts to consider as we continue our work.
Wednesday, May 22nd, 2013
Greg and Neha worked on learning how to use TCL code for the NS-2 simulations. We used this website for details: http://www.isi.edu/nsnam/ns/tutorial/nsscript5.html
Jared also gave Greg and Neha the following website links to look at, which will be useful as we continue to code:
http://www.teunisott.com/Adv.Netw/QoS.F.02/2tcp_1node_tcl.txt
http://www.mathcs.emory.edu/~cheung/Courses/558-old/Syllabus/90-NS/trace.html
http://getch.wordpress.com/2010/11/20/manual-interpretation-of-ns2-trace-file/
We were given formerly used code in TCL, documented in our computers as vanet_trust_model files.
We discussed the mathematical modeling more in detail. Greg and Neha also worked together on a Google Document to put all of the ideas together in one place, which we then checked with Jared, and formalized the threshold concept more in detail.
Tuesday, May 21st, 2013
Our team met and finished reading the newest paper we were sent. Concluding this we worked to formalize our abstract as well as start creating our mathematical model to calculate the confidence of a message that is received.
Monday, May 20th, 2013
Our team met and discussed the articles in depth. The papers discussed were: Minhas, Umar Farooq, et al. "Towards expanded trust management for agents in vehicular ad-hoc networks." International Journal of Computational Intelligence Theory and Practice (IJCITP) 5.1 (2010)., and Chen, Chen, et al. "Secure and efficient trust opinion aggregation for vehicular ad-hoc networks." Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd. IEEE, 2010.
Multiple questions and new ideas were explored, and these initial ideas were formally and mathematically written out. Then, Neha and Greg installed VMware and Ubuntu, then installed eclipse on Ubuntu. Then, they installed Sudo apt-get and ns2 codes to look at.
Friday, May 17th 2013
The project was selected. For the weekend, we will read "Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-hoc Networks" and "Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks". We will discuss them on Monday and have a preliminary draft of our Abstract.