298,055 research outputs found

    Security Threats and Challenges for Wireless Sensor Network

    Get PDF
    A wireless sensor network is a network of a large number of independently working small sensing units which can communicate wirelessly. The basic plan of a Wireless sensor network (WSN) is to structural distribute self-determining devices using sensors to monitor physical or environmental conditions. Wireless communication technology performance different forms of security threats. WSN need effective security mechanisms because of these networks deployed in untended environments. Due to fixed limitations in wireless sensor networks, security is a crucial issue. The intent of this paper is to investigate the security-related threats and challenges in wireless sensor networks. The threats faced by this WSN are similar but not limited to those observed in a simple network of computers or Internet.We identify thesensorsecuritythreats, review proposed security mechanisms for wireless sensor networks

    Computer memories: the history of computer form

    Get PDF
    This paper looks at the computer as a truly global form. The similar beige boxes found in offices across the world are analysed from the perspective of design history rather than that of the history of science and technology. Through the exploration of an archive of computer manufacturer's catalogues and concurrent design texts, this paper examines the changes that have occurred in the production and consumption of the computer in the context of the workplace, from its inception as a room-sized mainframe operated through a console of flashing lights, to the personal computer as a 'universal' form, reproduced by many manufacturers. It shows how the computer in the past has been as diverse as any other product, and asks how and why it now appears as a standardised, sanitised object. In doing so our relationship with the office computer, past and present is explored, revealing a complex history of vicissitude.</p

    Yieldy, a cross platform device monitoring and internal communication application for small sized enterprises

    Get PDF
    Treballs Finals de Grau d'Enginyeria InformĂ tica, Facultat de MatemĂ tiques, Universitat de Barcelona, Any: 2020, Director: RaĂșl Roca CĂĄnovas[eng] The following project, called "Yieldy," is a cross-platform application that runs on Android, iOS, and web to monitor small-sized businesses' devices and allow users to communicate by posting messages, creating, and editing tasks. It is worth mentioning that before this project, there is a previous one called "WyServer" that has almost the same task. For several reasons, the first project, "WyServer" that I designed and implemented before this final degree project, did not run as expected since it missed many requirements. To conclude, this project is developed under the deprecated "WyServer" by adding new requirements and redesigning its structure. The application is mainly designed for companies that have a large number of devices running. "Yieldy" helps the company to manage all the devices (computers or servers) connected. It provides the possibility to monitor the device's status, such as memory usage, CPU usage, socket, and process summary... Besides, the mobile version has a real-time notification system to let users know when a task or a message is published in a company's system (the group that allows users to communicate within them)

    The impact of agricultural activities on water quality: a case for collaborative catchment-scale management using integrated wireless sensor networks

    No full text
    The challenge of improving water quality is a growing global concern, typified by the European Commission Water Framework Directive and the United States Clean Water Act. The main drivers of poor water quality are economics, poor water management, agricultural practices and urban development. This paper reviews the extensive role of non-point sources, in particular the outdated agricultural practices, with respect to nutrient and contaminant contributions. Water quality monitoring (WQM) is currently undertaken through a number of data acquisition methods from grab sampling to satellite based remote sensing of water bodies. Based on the surveyed sampling methods and their numerous limitations, it is proposed that wireless sensor networks (WSNs), despite their own limitations, are still very attractive and effective for real-time spatio-temporal data collection for WQM applications. WSNs have been employed for WQM of surface and ground water and catchments, and have been fundamental in advancing the knowledge of contaminants trends through their high resolution observations. However, these applications have yet to explore the implementation and impact of this technology for management and control decisions, to minimize and prevent individual stakeholder’s contributions, in an autonomous and dynamic manner. Here, the potential of WSN-controlled agricultural activities and different environmental compartments for integrated water quality management is presented and limitations of WSN in agriculture and WQM are identified. Finally, a case for collaborative networks at catchment scale is proposed for enabling cooperation among individually networked activities/stakeholders (farming activities, water bodies) for integrated water quality monitoring, control and management

    Wattsup? Motivating reductions in domestic energy consumption using social networks

    Get PDF
    This paper reports on the design, deployment and evaluation of “Wattsup”, an innovative application which displays live autonomously logged data from the Wattson energy monitor, allowing users to compare domestic energy consumption on Facebook. Discussions and sketches from a workshop with Facebook users were used to develop a final design implemented using the Facebook API. Wattson energy monitors and the Wattsup app were deployed and trialled in eight homes over an eighteen day period in two conditions. In the first condition participants could only access their personal energy data, whilst in the second they could access each others’ data to make comparisons. A significant reduction in energy was observed in the socially enabled condition. Comments on discussion boards and semi-structured interviews with the participants indicated that the element of competition helped motivate energy savings. The paper argues that socially-mediated banter and competition made for a more enjoyable user experience

    Presenting dynamic information on mobile computers

    Get PDF
    A problem with mobile computing devices is the output of dynamic information owing to their small screens. This paper describes an experiment to investigate the use of non-speech sounds to present dynamic information without using visual display space. Results showed that non-speech sound could be used in a simple share-dealing scenario to present a “sound graph” of share prices. This allowed participants to reduce the workload they had to invest in share-price monitoring as they could listen to the graph whilst they worked in a share accumulation window

    Deep Space Network information system architecture study

    Get PDF
    The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies, such as the following: computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Holistic debugging - enabling instruction set simulation for software quality assurance

    Get PDF
    We present holistic debugging, a novel method for observing execution of complex and distributed software. It builds on an instruction set simulator, which provides reproducible experiments and non-intrusive probing of state in a distributed system. Instruction set simulators, however, only provide low-level information, so a holistic debugger contains a translation framework that maps this information to higher abstraction level observation tools, such as source code debuggers. We have created Nornir, a proof-of-concept holistic debugger, built on the simulator Simics. For each observed process in the simulated system, Nornir creates an abstraction translation stack, with virtual machine translators that map machine-level storage contents (e.g. physical memory, registers) provided by Simics, to application-level data (e.g. virtual memory contents) by parsing the data structures of operating systems and virtual machines. Nornir includes a modified version of the GNU debugger (GDB), which supports non-intrusive symbolic debugging of distributed applications. Nornir's main interface is a debugger shepherd, a programmable interface that controls multiple debuggers, and allows users to coherently inspect the entire state of heterogeneous, distributed applications. It provides a robust observation platform for construction of new observation tools
    • 

    corecore