2 resultados para Traffic Flow Modeling.

em Illinois Digital Environment for Access to Learning and Scholarship Repository


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work represents ongoing efforts to study high-enthalpy carbon dioxide flows in anticipation of the upcoming Mars Science Laboratory (MSL) and future missions to the red planet. The work is motivated by observed anomalies between experimental and numerical studies in hypervelocity impulse facilities for high enthalpy carbon dioxide flows. In this work, experiments are conducted in the Hypervelocity Expansion Tube (HET) which, by virtue of its flow acceleration process, exhibits minimal freestream dissociation in comparison to reflected shock tunnels. This simplifies the comparison with computational result as freestream dissociation and considerable thermochemical excitation can be neglected. Shock shapes of the MSL aeroshell and spherical geometries are compared with numerical simulations incorporating detailed CO2 thermochemical modeling. The shock stand-off distance has been identified in the past as sensitive to the thermochemical state and as such, is used here as an experimental measurable for comparison with CFD and two different theoretical models. It is seen that models based upon binary scaling assumptions are not applicable for the low-density, small-scale conditions of the current work. Mars Science Laboratory shock shapes at zero angle of attack are also in good agreement with available data from the LENS X expansion tunnel facility, confi rming results are facility-independent for the same type of flow acceleration, and indicating that the flow velocity is a suitable first-order matching parameter for comparative testing. In an e ffort to address surface chemistry issues arising from high-enthalpy carbon dioxide ground-test based experiments, spherical stagnation point and aeroshell heat transfer distributions are also compared with simulation. Very good agreement between experiment and CFD is seen for all shock shapes and heat transfer distributions fall within the non-catalytic and super-catalytic solutions. We also examine spatial temperature profiles in the non-equilibrium relaxation region behind a stationary shock wave in a hypervelocity air Mach 7.42 freestream. The normal shock wave is established through a Mach reflection from an opposing wedge arrangement. Schlieren images confirm that the shock con guration is steady and the location is repeatable. Emission spectroscopy is used to identify dissociated species and to make vibrational temperature measurements using both the nitric oxide and the hydroxyl radical A-X band sequences. Temperature measurements are presented at selected locations behind the normal shock. LIFBASE is used as the simulation spectrum software for OH temperature-fitting, however the need to access higher vibrational and rotational levels for NO leads to the use of an in-house developed algorithm. For NO, results demonstrate the contribution of higher vibrational and rotational levels to the spectra at the conditions of this study. Very good agreement is achieved between the experimentally measured NO vibrational temperatures and calculations performed using an existing state-resolved, three-dimensional forced harmonic oscillator thermochemical model. The measured NO A-X vibrational temperatures are significantly higher than the OH A-X temperatures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.