15 research outputs found
Development and implementation of a method to detect an abnormal behavior of nodes in a group of robots
The present paper examines the issues of security in a group of mobile robots in the implementation of malicious attacks aimed at the availability of information. The main methods and approaches for detecting attacks and mobile robots anomalies were analyzed. The major advantages and disadvantages of existing approaches were identified. The aim is to develop an attack detection method that allows avoiding a creation of either a reference distribution, or a signature database, or rules for a group of mobile robots. The method should detect anomalies within the current conditions with a dynamically changing network structure. The paper presents a method for detecting abnormal behavior of a network node based on analysis of parameters: the residual energy and network load. The behavior of individual robots of the group is analyzed with respect to the deviation from the general behavior using probabilistic methods, which avoids creating a reference distribution for describing the behavior of the node, as well as the creating of a signature database for detecting anomalies. The developed method of detecting abnormal behavior based on the probabilistic evaluation of events. Three types of a network node state were defined, a graph of node transitions to each state was constructed, and parameters that affect these transitions were determined. The developed method demonstrates a high detection rate of denial of service attacks and distributed denial of service attacks when the number of malicious nodes is not greater than or slightly greater than the amount trusted nodes. It also provides detection of the Sybil attack. An experimental study was carried out. It includes the development of a model to simulate a group of mobile robots, in particular a robot network. Scenarios of attacks were developed, implemented for a group of mobile robots. It allows evaluating the effectiveness of this method of anomalous behavior detection. To determine the effectiveness of the developed method, the following indicators were used: time of detection of attackers and the number of nodes of the attacker that can be detected
Internet of Things for Mental Health: Open Issues in Data Acquisition, Self-Organization, Service Level Agreement, and Identity Management
The increase of mental illness cases around the world can be described as an urgent
and serious global health threat. Around 500 million people suffer from mental disorders, among
which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological
paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess,
and care for patients early. This paper comprehensively survey works done at the intersection
between IoT and mental health disorders. We evaluate multiple computational platforms, methods
and devices, as well as study results and potential open issues for the effective use of IoT systems
in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT
solutions for mental health care, which can be relevant given the potential impairments in some
mental health patients such as data acquisition issues, lack of self-organization of devices and service
level agreement, and security, privacy and consent issues, among others. We aim at opening the
conversation for future research in this rather emerging area by outlining possible new paths based
on the results and conclusions of this work.Consejo Nacional de Ciencia y Tecnologia (CONACyT)Sonora Institute of Technology (ITSON) via the PROFAPI program
PROFAPI_2020_0055Spanish Ministry of Science, Innovation and Universities (MICINN) project "Advanced Computing Architectures and Machine Learning-Based Solutions for Complex Problems in Bioinformatics, Biotechnology and Biomedicine"
RTI2018-101674-B-I0
Routing Protocols for Underwater Acoustic Sensor Networks: A Survey from an Application Perspective
Underwater acoustic communications are different from terrestrial radio communications; acoustic channel is asymmetric and has large and variable endâtoâend propagation delays, distanceâdependent limited bandwidth, high bit error rates, and multiâpath fading. Besides, nodesâ mobility and limited battery power also cause problems for networking protocol design. Among them, routing in underwater acoustic networks is a challenging task, and many protocols have been proposed. In this chapter, we first classify the routing protocols according to application scenarios, which are classified according to the number of sinks that an underwater acoustic sensor network (UASN) may use, namely singleâsink, multiâsink, and noâsink. We review some typical routing strategies proposed for these application scenarios, such as crossâlayer and reinforcement learning as well as opportunistic routing. Finally, some remaining key issues are highlighted
A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions
In recent decades, social network anonymization has become a crucial research
field due to its pivotal role in preserving users' privacy. However, the high
diversity of approaches introduced in relevant studies poses a challenge to
gaining a profound understanding of the field. In response to this, the current
study presents an exhaustive and well-structured bibliometric analysis of the
social network anonymization field. To begin our research, related studies from
the period of 2007-2022 were collected from the Scopus Database then
pre-processed. Following this, the VOSviewer was used to visualize the network
of authors' keywords. Subsequently, extensive statistical and network analyses
were performed to identify the most prominent keywords and trending topics.
Additionally, the application of co-word analysis through SciMAT and the
Alluvial diagram allowed us to explore the themes of social network
anonymization and scrutinize their evolution over time. These analyses
culminated in an innovative taxonomy of the existing approaches and
anticipation of potential trends in this domain. To the best of our knowledge,
this is the first bibliometric analysis in the social network anonymization
field, which offers a deeper understanding of the current state and an
insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure
Survey: An overview of lightweight RFID authentication protocols suitable for the maritime internet of things
The maritime sector employs the Internet of Things (IoT) to exploit many of its benefits to maintain a competitive advantage and keep up with the growing demands of the global economy. The maritime IoT (MIoT) not only inherits similar security threats as the general IoT, it also faces cyber threats that do not exist in the traditional IoT due to factors such as the support for long-distance communication and low-bandwidth connectivity. Therefore, the MIoT presents a significant concern for the sustainability and security of the maritime industry, as a successful cyber attack can be detrimental to national security and have a flow-on effect on the global economy. A common component of maritime IoT systems is Radio Frequency Identification (RFID) technology. It has been revealed in previous studies that current RFID authentication protocols are insecure against a number of attacks. This paper provides an overview of vulnerabilities relating to maritime RFID systems and systematically reviews lightweight RFID authentication protocols and their impacts if they were to be used in the maritime sector. Specifically, this paper investigates the capabilities of lightweight RFID authentication protocols that could be used in a maritime environment by evaluating those authentication protocols in terms of the encryption system, authentication method, and resistance to various wireless attacks
Study Protocol on the Validation of the Quality of Sleep Data from Xiaomi Domestic Wristbands
[Abstract]
Background: Sleep disorders are a common problem for public health since they are considered potential triggers and predictors of some mental and physical diseases. Evaluating the sleep quality of a person may be a first step to prevent further health issues that diminish their independence and quality of life. Polysomnography (PSG) is the âgold standardâ for sleep studies, but this technique presents some drawbacks. Thus, this study intends to assess the capability of the new Xiaomi Mi Smart Band 5 to be used as a tool for sleep self-assessment. (2) Methods: This study will be an observational and prospective study set at the sleep unit of a hospital in A Coruña, Spain. Forty-three participants who meet the inclusion criteria will be asked to participate. Specific statistical methods will be used to analyze the data collected using the Xiaomi Mi Smart Band 5 and PSG. (3) Discussion: This study offers a promising approach to assess whether the Xiaomi Mi Smart Band 5 correctly records our sleep. Even though these devices are not expected to replace PSG, they may be used as an initial evaluation tool for users to manage their own sleep quality and, if necessary, consult a health professional. Further, the device may help users make simple changes to their habits to improve other health issues as well.This work is supported in part by grants from the European Social Fund 2014â2020. CITIC (Research Centre of the Galician University System) and the Galician University System (SUG) obtained funds through Regional Development Fund (ERDF), with 80% from the Operational Program ERDF Galicia 2014â2020 and the remaining 20% from the SecretarĂa Xeral de Universidades of the Galician University System (SUG). P.C.M. obtained a scholarship (Ref. ED481A-2019/069), and M.D.C.M.-D. obtained a scholarship (Ref. ED481A 2018/205) to develop a Ph.D. thesis. Furthermore, the diffusion and publication of this research are funded by the CITIC as a Research Centre by Galician University System with the support previously mentioned (Ref ED431G 2019/01). In addition, this work is also supported in part by the Ministerio de Ciencia e InnovaciĂłn R+D+I projects in the framework of national programs of knowledge generation and scientific and technological strengthening of the R+D+I system and challenges of societyâs oriented R+D+I 2019 call (PID2019-104323RB-C33)ED481A 2019/069ED481A 2018/205ED431G 2019/01ED431G 2019/01ED481A 2018/205ED481A-2019/069This work is supported in part by grants from the European Social Fund 2014â2020. CITIC (Research Centre of the Galician University System) and the Galician University System (SUG) obtained funds through Regional Development Fund (ERDF), with 80% from the Operational Program ERDF Galicia 2014â2020 and the remaining 20% from the SecretarĂa Xeral de Universidades of the Galician University System (SUG). P.C.M. obtained a scholarship (Ref. ED481A-2019/069), and M.D.C.M.-D. obtained a scholarship (Ref. ED481A 2018/205) to develop a Ph.D. thesis. Furthermore, the diffusion and publication of this research are funded by the CITIC as a Research Centre by Galician University System with the support previously mentioned (Ref ED431G 2019/01). In addition, this work is also supported in part by the Ministerio de Ciencia e InnovaciĂłn R+D+I projects in the framework of national programs of knowledge generation and scientific and technological strengthening of the R+D+I system and challenges of societyâs oriented R+D+I 2019 call (PID2019-104323RB-C33
Impact and key challenges of insider threats on organizations and critical businesses
The insider threat has consistently been identified as a key threat to organizations and governments. Understanding the nature of insider threats and the related threat landscape can help in forming mitigation strategies, including non-technical means. In this paper, we survey and highlight challenges associated with the identification and detection of insider threats in both public and private sector organizations, especially those part of a nationâs critical infrastructure. We explore the utility of the cyber kill chain to understand insider threats, as well as understanding the underpinning human behavior and psychological factors. The existing defense techniques are discussed and critically analyzed, and improvements are suggested, in line with the current state-of-the-art cyber security requirements. Finally, open problems related to the insider threat are identified and future research directions are discussed
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
Autonomous âThingsâ is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We present a proof-of-principle via a communication architecture model and implementation to simulate these laws of nature. The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. The proposed simulation initiates communication over a quantum channel for polarized photon transmission after a pre-agreed configuration over a Classic Channel with parameters. Simulation implementation results confirm that the presence of an eavesdropper is detectable during key generation due to Heisenbergâs uncertainty and no-cloning principles. An eavesdropper has a 0.5 probability of guessing transmission qubit and 0.25 for the polarization state. During simulation re-iterations, a base-mismatch process discarded about 50 percent of the total initial key bits with an Error threshold of 0.11 percent.</p
PHUIMUS: A Potential High Utility Itemsets Mining Algorithm Based on Stream Data with Uncertainty
High utility itemsets (HUIs) mining has been a hot topic recently, which can be used to mine the profitable itemsets by considering both the quantity and profit factors. Up to now, researches on HUIs mining over uncertain datasets and data stream had been studied respectively. However, to the best of our knowledge, the issue of HUIs mining over uncertain data stream is seldom studied. In this paper, PHUIMUS (potential high utility itemsets mining over uncertain data stream) algorithm is proposed to mine potential high utility itemsets (PHUIs) that represent the itemsets with high utilities and high existential probabilities over uncertain data stream based on sliding windows. To realize the algorithm, potential utility list over uncertain data stream (PUS-list) is designed to mine PHUIs without rescanning the analyzed uncertain data stream. And transaction weighted probability and utility tree (TWPUS-tree) over uncertain data stream is also designed to decrease the number of candidate itemsets generated by the PHUIMUS algorithm. Substantial experiments are conducted in terms of run-time, number of discovered PHUIs, memory consumption, and scalability on real-life and synthetic databases. The results show that our proposed algorithm is reasonable and acceptable for mining meaningful PHUIs from uncertain data streams