The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web applications commonly provide a high attack surface. In today's world of high impact attacks, protecting them against both known and unknown attacks becomes more important than ever. We present an approach of machine learning based anomaly detection to flexibly detect anomalous requests. Our approach leverages long short-term memory (LSTM) neural networks to learn a detailed model of normal requests...
Speed measurement is an important issue for some types of Wireless Sensor Networks (WSN), especially for Vehicular Ad-hoc Networks (VANETs). However, calculating this value is error-prone and costly. This report intends to demonstrate the calculation of speed of an object without the use of any additional devices or sensor boards, only using Received Signal Strength Indication (RSSI) for localization...
Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly...
Bicycle theft is a big problem in places such as university towns, where bicycles offer one of the most cost-efficient and quick ways for students to move around. For example, 1,200 bicycles are stolen yearly in Göttingen, with more than 300,000 being reported as stolen in the whole of Germany during 2014. We present a power efficient architecture to track the locations of stolen bicycles using opportunistic...
Wireless networks are spreading continuously, filling our homes and the world around us. By using a ZigBee network we will show that a person can be detected by analyzing the fluctuations of signal strength inside the network. The simplicity of our approach means that it could be extended to all wireless networks. This work shows both implications on privacy as well as promising advances in fields...
There are various regions of applications for wireless sensor networks (WSNs). In this demonstration, we are using a WSN to build an efficient and smart parking system for vehicles. Our application will use light sensors to automatically determine the use of parking spaces in a parking area and calculate billable parking time while also providing a useful overview of occupied and free parking spaces...
Securing communications in wireless sensor networks is increasingly important, as the diversity of applications increases. In this paper, we analyze the performance and power efficiency of bulk user data communications in a simple, secure PKI-based communication scheme employing a hybrid cryptographic approach. Detailed benchmarks of the involved cryptographic primitives are performed. The results...
This paper describes a simple secure scheme for wireless sensor motes. The purpose of the proposed scheme is to securely exchange data among motes by using Public Key Infrastructure (PKI) with a central authority. Key pairs are pre-distributed and signed by the Certification Authority (CA). The subsequent communication between the motes utilizes symmetric cryptography for efficiency reasons. In the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.