14 research outputs found

    A GA-based simulation system for WMNs: performance analysis for different WMN architectures considering transmission rate and OLRS protocol

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.In this paper, we evaluate the performance of two WMN architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering transmission rate and OLSR protocol. The simulation results show that for transmission rate 600 and 1200 [kbps], the throughput of Hybrid WMN is higher than I/B WMN. For transmission rate 600 and 1200 [kbps], the delay and jitter of Hybrid WMN is lower than I/B WMN. For transmission rate 600 and 1200 [kbps], the fairness index of I/B WMN is higher than Hybrid WMN.Peer ReviewedPostprint (author's final draft

    Performance analysis of WMNs by WMN-GA simulation system for exponential distribution considering EDCA and DCF

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.In this paper, we evaluate the performance of WMN using our WMN-GA simulation system considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3 and Optimized Link State Routing (OLSR). We compare the performance of Distributed Coordination Function (DCF) and Enhanced Distributed Channel Access (EDCA) for exponential distribution of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that for Hybrid WMN, the throughput of both MAC protocols is higher than I/B WMN. The delay and jitter of Hybrid WMN are lower than I/B WMN. The fairness index of I/B WMN is a little bit higher than Hybrid WMN.Peer ReviewedPostprint (author's final draft

    Performance analysis of WMNs by WMN-GA simulation system for different WMN architectures and TCP congestion-avoidance algorithms considering uniform distribution

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.In this paper, we evaluate the performance of two Wireless Mesh Networks (WMNs) architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3, Distributed Coordination Function (DCF) and Optimized Link State Routing (OLSR). We compare the performance for Transmission Control Protocol (TCP) Tahoe, Reno and NewReno for uniform distribution of mesh clients by sending multiple Constant Bit Rate (CBR) flows in the network. The simulation results show that for both WMN architectures, the PDR values of TCP congestion-avoidance algorithms are almost the same. For Hybrid WMN architecture, the throughput of TCP Reno is better than other algorithms. However, for I/B WMN, the throughput of TCP Tahoe is higher than other algorithms. The delay and jitter of TCP NewReno are a little bit lower compared with other algorithms. The I/B WMN architecture, the fairness index of TCP congestion-avoidance algorithms is almost the same.Peer ReviewedPostprint (author's final draft

    Node placement in Wireless Mesh Networks: a comparison study of WMN-SA and WMN-PSO simulation systems

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In our previous work, we implemented a simulation system based on Simulated Annealing (SA) for solving node placement problem in wireless mesh networks, called WMN-SA. Also, we implemented a Particle Swarm Optimization (PSO) based simulation system, called WMN-PSO. In this paper, we compare two systems considering calculation time. From the simulation results, when the area size is 32 × 32 and 64 × 64, WMN-SA is better than WMN-PSO. When the area size is 128 × 128, WMN-SA performs better than WMN-PSO. However, WMN-SA needs more calculation time than WMN-PSO.Peer ReviewedPostprint (author's final draft

    A fuzzy-based reliaility for JXTA-overlay P2P platform considering data download speed, peer congestion situation, number of interaction and packet loss parameters

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) communications in JXTA-Overlay platform considering as a new parameter the peer congestion situation. In our system, we considered four input parameters: Data Download Speed (DDS), Peer Congestion Situation (PCS), Number of Interactions (NI) and Packet Loss (PL) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.Peer ReviewedPostprint (author's final draft

    One leak will sink a ship:WebRTC IP address leaks

    Get PDF
    The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use. This a potentially serious problem for users utilizing VPN services for anonymity. In order to better understand the magnitude of this issue, we tested widely used browsers and VPN services to discover which client IP addresses can be revealed and in what circumstances. In most cases, at least one of the client addresses is leaked. The number and type of leaked IP addresses are affected by the choices of browser and VPN service, meaning that privacy-sensitive users should choose their browser and their VPN provider with care. We conclude by proposing countermeasures which can be used to help mitigate this issue

    Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?

    Get PDF
    In the last decade, Social Networks (SNs) have deeply changed many aspects of society, and one of the most widespread behaviours is the sharing of pictures. However, malicious users often exploit shared pictures to create fake profiles, leading to the growth of cybercrime. Thus, keeping in mind this scenario, authorship attribution and verification through image watermarking techniques are becoming more and more important. In this paper, we firstly investigate how thirteen of the most popular SNs treat uploaded pictures in order to identify a possible implementation of image watermarking techniques by respective SNs. Second, we test the robustness of several image watermarking algorithms on these thirteen SNs. Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. The proposed method is sufficiently robust, in spite of the fact that pictures are often downgraded during the process of uploading to the SNs. Moreover, in comparison to conventional watermarking methods the proposed method can successfully pass through different SNs, solving related problems such as profile linking and fake profile detection. The results of our analysis on a real dataset of 8400 pictures show that the proposed method is more effective than other watermarking techniques and can help to address serious questions about privacy and security on SNs. Moreover, the proposed method paves the way for the definition of multi-factor online authentication mechanisms based on robust digital features

    CNA Tactics and Techniques: A Structure Proposal

    Full text link
    [EN] Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious activities. In this paper, we propose the first global approach for CNA operations that can be used to map real-world activities. The proposal significantly reduces the amount of effort need to identify, analyze, and neutralize advanced threat actors targeting cyber physical systems. It follows a logical structure that can be easy to expand and adapt.Villalón-Huerta, A.; Ripoll-Ripoll, I.; Marco-Gisbert, H. (2021). CNA Tactics and Techniques: A Structure Proposal. Journal of Sensor and Actuator Networks. 10(1):1-23. https://doi.org/10.3390/jsan10010014S12310

    Urban Regeneration of Underused Industrial Sites in Albania

    Get PDF
    Industrial heritage can be considered as a significant asset of modern civilization, mostly epitomizing living patrimony of industrialization process. However, it nowadays represents under-valuated heritage, as a consequence of massive closure of industrial sites due to political and economical changes through years. This thesis focuses on the study and recognition of underused Albanian industrial sites, mostly constructed during the communist period, and proposes possible regeneration model based on international examples. The majority of Albanian degraded sites, due to change of regime and mass closure or harassment of industrial sites, are being seen as high priority objective from central government and municipalities. At the verge of approval of General National Plan of the Republic of Albania and most of Local General Plans for country’s municipalities, it has become a primary requirement the redevelopment of these “silent” assets, which now have the opportunity to become promotors of cities development. The study follows with descriptive analysis of international positive cases, reflecting how these internventions can be appropriately applied for Albanian cases. Consistent reuse methodologies were proposed based on three pillars: economic and urban, environmental and heritage. Lastly, this thesis presents general conclusion for practical application of the above mentioned methodologies, as a positive approac
    corecore