The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security issues in unmanned aerial vehicle (UAV) networks attract the attention of both industry and research community. This is due to the large number of attacks that can target such networks with a goal for instance to jam the communication, disturb the network operation, inject wrong data, etc. In this paper, we propose and implement a cyber security system to protect the UAVs against the most...
The Internet has become a fundamental platform for virtually all social, economical and security activities in modern societies. Monitoring widespread events on the Internet has many important applications in social trend studies and distributed intrusion/attack detection. This paper studies the problem of distributed joint detection of widespread events observed by the collaborating network devices...
Due to limited resource, noise and unreliable link, data loss and sensor faults are common in medical body sensor networks (BSN). Most available works used data reconstruction to improve data quality in traditional wireless sensor networks (WSN). However, existing data reconstruction schemes using redundant information of WSN can not provide a satisfactory accuracy for BSN. In light of this, a Bayesian...
Crowdsensing recently attracts great attention from both industry and academia. By fusing and analyzing multi- dimensional sensing data collected from crowdsensing users, it is possible to support health caring, environment mentoring, traffic mentoring and social behavior mentoring. Nonetheless, how to preserve users' data privacy during data fusing, e.g., data aggregation, has been rarely discussed...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
Sweep coverage is an important problem in wireless sensor networks. With sweep coverage, more Points Of Interests (POIs) can be monitored with fewer mobile sensor nodes thanks to the mobility of the nodes. Most existing studies on sweep coverage focus on the trajectory of the mobile sensor nodes to guarantee the sweep coverage of the POIs. Considering the fact that, in many applications, the collected...
Software Defined Networks (SDN) provide a high simplification of the network management by decoupling the control plane from the data plane through the use of controllers. Distributed-Denial-of-Service (DDoS) attacks can make SDN controllers unavailable to process legitimate flow requests from switches. The main approaches to protect controllers against DDoS attacks are essentially based on the attack...
Recently, Unmanned Aerial Vehicle (UAV) networks attracts a lot of interest as one of promising research areas since it can be used for a large portfolio of relevant applications. Among several issues in UAV networks, a collision avoidance among multiple UAVs should be addressed due to its significance. Furthermore, a barrier-coverage is considered as an important coverage concept because it is also...
In this paper, the design of a truthful mechanism for prioritized medical packet transmissions in e-health networks is studied. Unlike most of existing works, we focus on beyond wireless body area networks (beyond-WBANs), and consider the absolutely prioritized scheduling, i.e., emergent medical signals have to always be transmitted prior to normal ones. In our model, medical packets arrive randomly...
Abstract-Public-cloud providers do not disclose quantitative information about the performance of their inter- datacenter networks in spite of their importance and of the growing interest they are attracting. In this paper we propose an analysis of the inter-datacenter network of the two leading providers-Amazon Web Services and Microsoft Azure- only leveraging active monitoring approaches and thus...
Analysing the power usage of an Internet of Things (IoT) device is essential in contexts such as smart building, testbed and forensics. For example, in the smart building case, schemes have been proposed to detect and analyse the activity of electric appliances based on the total power usage. In this work, we intend to take this concept a step further and devise a method to analyse the activity of...
A major problem of the grid system is identifying the source of abnormal behaviors. It is particularly important to identify the areas in which the grid system suffers from power deficiencies due to fault or voltage instability. Phasor Measurement Units (PMUs) are capable of measuring current and voltage amplitudes and phase angles, which can then be effectively used to monitor the power quality....
In areas where the habitats of elephants and humans are rapidly encroaching on each other, real-time monitoring of the elephants' locations has the potential to drastically improve the co-existence of elephants and humans, resulting in reduced deaths in both groups. However, as tagging (using GPS collars) elephants to obtain such location information is difficult and costly, it is important to ensure...
Distributed stream processing platforms is a new class of real-time monitoring systems that analyze and extracts knowledge from large continuous streams of data. This type of systems is crucial for providing high throughput and low latency required by Big Data or Internet of Things monitoring applications. This paper describes and analyzes three main open-source distributed stream- processing platforms:...
In this paper, we study the optimum sensing of a time-varying random event with a sensor powered by energy harvesting devices. The system aims at reconstructing a band-unlimited continuous-time random process by using discrete-time samples collected by a sensor. Due to the random nature of the harvested energy, the sensor might not have sufficient energy to perform a sensing operation at a desired...
Crowdsensing has become increasingly popular due to its ability to collect a massive amount of real-time data with the help of many individual smartphone users. A crowdsensing platform can utilize the collected data to extract effective information and provide services to service requesters. Due to the rationality of smartphone users, designing an incentive mechanism to compensate the participants...
Network resource virtualization emerged as the future of communication technology recently, and the advent of Software Define Network (SDN) and Network Function Virtualization (NFV) enables the realization of network resource virtualization. NFV virtualizes traditional physical middle-boxes that implement specific network functions. Since multiple network functions can be virtualized in a single server...
We study optimal monitor placement for intrusion detection in networks with persistent attackers. The problem is modeled as a stochastic game in which the attacker attempts to control targets by delivering malicious packets while the defender tries to detect such attempts. The state of the game is determined by the target end-systems in the network, each of which can be in either a healthy or a compromised...
The performance of Smart Data Pricing (SDP) highly depends on the accuracy and reliability of measuring network bandwidth usage. The existing Internet protocol uses the distributed control, and the transport network protocols run together inside the routers and switches. However, it is hard to manage and retrieve online and precise measurements from the networks due to the large number of traffic...
Hash table is used in many areas of networking such as route lookup, packet classification, per-flow state management and network monitoring for its constant access time latency at moderate loads. However, collisions may become frequent at high loads in traditional hash tables, which may lead the access time complexity to be linear and intolerable to applications like high-speed route lookups. While...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.