Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Vidler is active.

Publication


Featured researches published by John Vidler.


ieee european symposium on security and privacy | 2016

It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe

Sylvain Frey; Yehia Elkhatib; Awais Rashid; Karolina Follis; John Vidler; Nicholas J. P. Race; Christopher Edwards

The Internet is often thought to be a model of resilience, due to a decentralised, organically-grown architecture. This paper puts this perception into perspective through the results of a security analysis of the Border Gateway Protocol (BGP) routing infrastructure. BGP is a fundamental Internet protocol and its intrinsic fragilities have been highlighted extensively in the literature. A seldom studied aspect is how robust the BGP infrastructure actually is as a result of nearly three decades of perpetual growth. Although global black-outs seem unlikely, local security events raise growing concerns on the robustness of the backbone. In order to better protect this critical infrastructure, it is crucial to understand its topology in the context of the weaknesses of BGP and to identify possible security scenarios. Firstly, we establish a comprehensive threat model that classifies main attack vectors, including but non limited to BGP vulnerabilities. We then construct maps of the European BGP backbone based on publicly available routing data. We analyse the topology of the backbone and establish several disruption scenarios that highlight the possible consequences of different types of attacks, for different attack capabilities. We also discuss existing mitigation and recovery strategies, and we propose improvements to enhance the robustness and resilience of the backbone. To our knowledge, this study is the first to combine a comprehensive threat analysis of BGP infrastructures withadvanced network topology considerations. We find that the BGP infrastructure is at higher risk than already understood, due to topologies that remain vulnerable to certain targeted attacks as a result of organic deployment over the years. Significant parts of the system are still uncharted territory, which warrants further investigation in this direction.


International Journal of Human-computer Interaction | 2017

A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

Faisal Taher; John Vidler; Jason Alexander

ABSTRACT This article characterizes actuation techniques for generating movement in shape-changing displays with physically reconfigurable geometry. To date, few works in human–computer interaction literature provide detailed and reflective descriptions of the implementation techniques used in shape-changing displays. This hinders the rapid development of novel interactions as researchers must initially spend time understanding technologies before prototyping new interactions and applications. To bridge this knowledge gap, the authors propose a taxonomy that classifies actuator characteristics and simplifies the process for designers to select appropriate technologies that match their requirements for developing shape displays. They scope the investigation to linear actuators that are used in grid configurations. The taxonomy is validated by (a) examining current implementation techniques of motorized, pneumatic, hydraulic, magnetic, and shape-memory actuators in the literature, (b) constructing prototypes to address limited technical details and explore actuator capabilities in depth, (c) describing a use-case scenario through a case study that details the construction of a 10 × 10 actuator shape-display, and (d) a set of guidelines to aid researchers in selecting actuation techniques for shape-changing applications. The significance of their taxonomy is twofold. First, the authors provide an original contribution that enables HCI researchers to appropriately select actuation techniques and build shape-changing applications. This is situated amongst other past works that have investigated broader application scenarios such as a shape-changing vocabulary, a framework for shape transformations, material properties, and technical characteristics of various actuators. Second, they carry out in-depth investigations to validate their taxonomy and expand the knowledge of vertical actuation in shape-changing applications to enable rapid development.


local computer networks | 2015

Estimating node lifetime in interference environments

Alex King; James Brown; John Vidler; Utz Roedig

For commercial Wireless Sensor Network (WSNs) deployments it is necessary to estimate the network lifetime. It must be possible before network deployment to determine how long a network maintains operational before maintenance is required and batteries have to be replaced. Unfortunately, node lifetime is very dependent on the radio environment in which the node is operated. As we will demonstrate in this paper the node lifetime in a very busy radio environment can be up to 11 times shorter than in a quiet environment. WSNs employ duty-cycled communication protocols where receivers periodically sample the channel to determine if it has to remain active to receive a message. Radio interference triggers the receive mechanism causing an unnecessary wake-up which leads to an increase in a nodes energy consumption. In this paper we present a method for estimating node energy consumption in a target radio environment. We describe how to capture the essential characteristics of the radio environment and how to use this information to predict node lifetime. We demonstrate the usability of the proposed method using the well known WSN communication protocol ContikiMAC. Our evaluation comprising real-world scenarios shows that the proposed method is able to accurately predict node lifetime.


human factors in computing systems | 2015

ShapeClip: Towards Rapid Prototyping with Shape-Changing Displays for Designers

John G. Hardy; Christian Weichel; Faisal Taher; John Vidler; Jason Alexander


international conference on embedded wireless systems and networks | 2016

LoRa for the Internet of Things

Martin C. Bor; John Vidler; Utz Roedig


Archive | 2015

Cyber security controls effectiveness : a qualitative assessment of cyber essentials

Jose M. Such; John Vidler; Timothy Seabrook; Awais Rashid


Archive | 2017

Keeping Properties with the Data CL-MetaHeaders - An Open Specification

John Vidler; Stephen Wattam


Archive | 2014

Dealing with big data outside of the cloud:GPU accelerated sort

John Vidler; Paul Rayson; Laurence Anthony; Andrew Scott; John A. Mariani


Archive | 2014

Report on Runtime Assurance

James Brown; John Vidler; Ibrahim Ethem Bagci; Utz Roedig; Carlo Alberto Boano; Felix Jonathan Oppermann; Marcel Carsten Baunach; Kay Uwe Römer; Marco Zuniga; Faisal Aslam; Koen Langendoen


Archive | 2014

D-2.2 & D-2.3 - Report on Protocol Models & Validation and Verification

Marco Zuniga; Ioannis Protonotoarios; Si Li; Faisal Aslam; Koen Langendoen; Carlo Alberto Boano; Kay Uwe Römer; James Brown; John Vidler; Ibrahim Ethem Bagci; Utz Roedig; Luca Mottola; Thiemo Voigt; Ioannis Glaropoulos

Collaboration


Dive into the John Vidler's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Carlo Alberto Boano

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kay Uwe Römer

Graz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Faisal Aslam

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Koen Langendoen

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Marco Zuniga

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge