1,054 research outputs found

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates

    Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services

    Get PDF
    This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book

    Stable dynamic feedback-based predictive clustering protocol for vehicular ad hoc networks

    Get PDF
    Scalability presents a significant challenge in vehicular communication, particularly when there is no hierarchical structure in place to manage the increasing number of vehicles. As the number of vehicles increases, they may encounter the broadcast storm problem, which can cause network congestion and reduce communication efficiency. Clustering can solve these issues, but due to high vehicle mobility, clustering in vehicular ad hoc networks (VANET) suffers from stability issues. Existing clustering algorithms are optimized for either cluster head or member, and for highways or intersections. The lack of intelligent use of mobility parameters like velocity, acceleration, direction, position, distance, degree of vehicles, and movement at intersections, also contributes to cluster stability problems. A dynamic clustering algorithm that efficiently utilizes all mobility parameters can resolve these issues in VANETs. To provide higher stability in VANET clustering, a novel robust and dynamic mobility-based clustering algorithm called junction-based clustering protocol for VANET (JCV) is proposed in this dissertation. Unlike previous studies, JCV takes into account position, distance, movement at the junction, degree of a vehicle, and time spent on the road to select the cluster head (CH). JCV considers transmission range, the moving direction of the vehicle at the next junction, and vehicle density in the creation of a cluster. JCV's performance is compared with two existing VANET clustering protocols in terms of the average cluster head duration, the average cluster member (CM) duration, the average number of cluster head changes, and the percentage of vehicles participating in the clustering process, etc. To evaluate the performance of JCV, we developed a new cloud-based VANET simulator (CVANETSIM). The simulation results show that JCV outperforms the existing algorithms and achieves better stability in terms of the average CH duration (4%), the average CM duration (8%), the number of CM (6%), the ratio of CM (22%), the average CH change rate (14%), the number of CH (10%), the number of non-cluster vehicles (7%), and clustering overhead (35%). The dissertation also introduced a stable dynamic feedback-based predictive clustering (SDPC) protocol for VANET, which ensures cluster stability in both highway and intersection scenarios, irrespective of the road topology. SDPC considers vehicle relative velocity, acceleration, position, distance, transmission range, moving direction at the intersection, and vehicle density to create a cluster. The cluster head is selected based on the future construction of the road, considering relative distance, movement at the intersection, degree of vehicles, majority-vehicle, and probable cluster head duration. The performance of SDPC is compared with four existing VANET clustering algorithms in various road topologies, in terms of the average cluster head change rate, duration of the cluster head, duration of the cluster member, and the clustering overhead. The simulation results show that SDPC outperforms existing algorithms, achieving better clustering stability in terms of the average CH change rate (50%), the average CH duration (15%), the average CM duration (6%), and the clustering overhead (35%)

    Near-Real Time, Semi-Automated Threat Assessment of Information Environments

    Get PDF
    Threat assessment is a crucial process for monitoring and defending against potential threats in an organization’s information environment and business operations. Ensuring the security of information infrastructure requires effective information security practices. However, existing models and methodologies often fall short of addressing the dynamic and evolving nature of cyberattacks. Moreover, critical threat intelligence extracted from the threat agents lacks the ability to capture essential attributes such as motivation, opportunity, and capability (M, O, C). This contribution to knowledge clarification introduces a semi-automatic threat assessment model that can handle situational awareness data or live acquired data stream from networks, incorporating information security techniques, protocols, and real-time monitoring of specific network types. Additionally, it focuses on analysing and implementing network traffic within a specific real-time information environment. To develop the semi-automatic threat assessment model, the study identifies unique attributes of threat agents by analysing Packet Capture Application Programming Interface (PCAP) files and data stream collected between 2012 and 2019. The study utilizes both hypothetical and real-world examples of threat agents to evaluate the three key factors: motivation, opportunity, and capability. This evaluation serves as a basis for designing threat profiles, critical threat intelligence, and assessing the complexity of process. These aspects are currently overlooked in existing threat agent taxonomies, models, and methodologies. By addressing the limitations of traditional threat assessment approaches, this research contributes to advancing the field of cybersecurity. The proposed semi-automatic threat assessment model offers improved awareness and timely detection of threats, providing organizations with a more robust defence against evolving cyberattacks. This research enhances the understanding of threat agents’ attributes and assists in developing proactive strategies to mitigate the risks associated with cybersecurity in the modern information environment

    Codificación adaptativa de red para sistemas inalámbricos IEEE 802.11s en modo infraestructura

    Get PDF
    Las redes inalámbricas malladas IEEE 802.11s en modo infraestructura, denominadas comúnmente como iWMNs (Infrastructure Wireless Mesh Networks), están constituidas por nodos inalámbricos estáticos capaces de trabajar coordinadamente para encaminar paquetes de datos. De esta manera, los nodos colaboran para poder intercambiar información entre sí. Más aún, las iWMNs pueden ser interconectadas con otras tecnologías de red y, de este modo, coadyuvar a extender inalámbricamente la cobertura de estas redes; por ejemplo, las iWMNs se emplean hoy en día para extender la cobertura de redes celulares o de redes cableadas. Gracias a estas características, y también a su bajo costo de infraestructura, las redes iWMNs son consideradas hoy en día como una excelente opción para ofrecer servicios de conectividad inalámbrica a Internet en zonas geográficas donde el uso de otras tecnologías resulta inviable. A pesar de las prometedoras características de las iWMNs; existen estudios y resultados que plantean dudas sobre su desempeño, ya que se ha documentado que el rendimiento de estas redes puede ser afectado por numerosos factores; tales como el uso de TCP para transportar información en entornos inalámbricos, la tasa de errores en el medio inalámbrico, así como la contienda por el acceso al medio entre usuarios de la red. Todos estos factores pueden degradar las prestaciones de las iWMNs y, consecuentemente, afectar la calidad de la experiencia que reciben los usuarios. En esta tesis doctoral se atienden algunos de estos problemas de desempeño mediante la técnica denominada como codificación adaptativa de red. Esta técnica ayuda a que los nodos de una iWMN puedan combinar varios paquetes de datos y de este modo construir un paquete codificado; al transmitir este paquete se transporta la información contenida en los paquetes originales requiriendo únicamente una transmisión inalámbrica, reduciendo de esta manera el uso del medio inalámbrico y, con ello, se incrementa la capacidad de la red. La técnica propuesta, además, busca que el proceso de codificación se adapte a las condiciones de tráfico en la red a través del ajuste dinámico del tiempo de espera de los paquetes en un nodo antes de poder ser combinados; es así como se puede disminuir el retardo de codificación. Con esta propuesta se pretende mejorar sustancialmente el desempeño de las iWMNs, resolviendo algunos problemas que las afectan. La evaluación de la propuesta se realiza empleando simulaciones y evaluaciones numéricas. A través de un minucioso análisis de resultados encontramos que las iWMNs pueden mejorar su rendimiento al emplear la técnica de codificación adaptativa de red, ya que se reduce considerablemente el número de transmisiones inalámbricas en la red, y, por consiguiente: i) se disminuye la contienda por el medio, ii) se reducen las probabilidades de error en el medio y iii) se incrementa la capacidad de la red.IEEE 802.11s INFRASTRUCTURE WIRELESS MESH NETWORKS (commonly known as iWMNs) are integrated by static wireless nodes capable of working in coordination to route data packets. In this way, the nodes collaborate to exchange information with each other. In addition, iWMNs can be interconnected with other network technologies and, in this way, help to wirelessly extend the coverage of these networks; for example, iWMNs are used today to extend the coverage of cellular or wired networks. Thanks to this feature, and also to their low infrastructure cost, iWMNs networks are considered today as an excellent option to offer wireless Internet connectivity services in geographical areas where the use of other network technologies is unfeasible. Despite the promising features of iWMNs, there are studies and results that cast doubt on their performance, since it has been documented that the performance of these networks can be affected by numerous factors; such as the use of TCP to transport information in wireless environments, the transmission errors in the wireless medium, as well as the access contention between network users. All these factors can degrade the performance of iWMNs and, consequently, affect the quality of the experience for the users. In this doctoral thesis, some of these performance problems are addressed through the technique called adaptive network coding. With this technique, the nodes of an iWMN are allowed to combine various data packets and thus build an encoded packet; this packet contains the information from the original packets, requiring only one wireless transmission to transport the original information, reducing the use of the wireless medium and, thereby, increasing the capacity of the network. The proposed technique also seeks to adapt the coding process to the traffic conditions in the network through the dynamic adjustment of the waiting time of the packets in a node before they can be combined. This proposal aims to substantially improve the performance of iWMNs, solving some problems that affect them. The evaluation of the proposal is carried out through simulations and numerical evaluations. After a detailed analysis of the results, we find that iWMNs can improve their performance by using the adaptive network coding technique, since the number of wireless transmissions in the network is considerably reduced, and, consequently, i) the medium access contention decreases, ii) the probability of errors in the medium is reduced, and iii) the capacity of the network increase

    Design, Modelling and Analysis of Satcoms for UAV operations

    Get PDF
    Η ανάγκη για άμεση συνεισφορά, απόκριση και ακρίβεια των αποτελεσμάτων οδήγησε στην είσοδο των drones και ιδιαίτερα των μη επανδρωμένων εναέριων οχημάτων (UAV) ως νέα τεχνολογικά οχήματα. Ωστόσο, η ενσωμάτωση ενός τόσο κολοσσιαίου τεχνολογικού αποκτήματος δεν είναι καθόλου εύκολη υπόθεση. Πολλές απαιτήσεις εμφανίζονται σε διάφορους τομείς όπως τηλεπικοινωνίες, προβλήματα ωφέλιμου φορτίου που πρέπει να φέρει το UAV και σχέδια λειτουργίας, απαιτήσεις που πρέπει να πληρούνται για την αποφυγή προβλημάτων ασφάλειας, αποφυγή σύγκρουσης, ασταθείς συνδέσεις και άλλα. Σκοπός της παρούσας διπλωματικής εργασίας είναι να μελετήσει όσο το δυνατόν καλύτερα και αποτελεσματικότερα τη συμβολή των δορυφορικών επικοινωνιών στην επίτευξη αξιόπιστων και ανθεκτικών επιχειρήσεων Μη Επανδρωμένων Αεροσκαφών (UAV). Θα παρουσιαστεί μια ανάλυση τριών επιπέδων που θα αφορά τον Σχεδιασμό, τη Μοντελοποίηση και την Ανάλυση δορυφορικών επικοινωνιών σε συνδυασμό με λειτουργίες UAV με τρόπο που η αποτελεσματικότητα της ζεύξης θα είναι μέγιστη εφικτή. Σε τελική ανάλυση, θα πραγματοποιηθεί ένα πείραμα που θα συζητηθούν τα αποτελέσματα και οι παράμετροι που χρησιμοποιούνται προκειμένου να υπολογιστεί η αποτελεσματικότητα του προϋπολογισμού των ζεύξεων. Είναι σημαντικό να γνωρίζουμε ότι οι κυψελοειδείς επικοινωνίες έχουν παίξει μέχρι στιγμής τον πιο σημαντικό και ακριβή ρόλο τόσο στις επίγειες όσο και στις αεροπορικές επικοινωνίες. Αυτό πρόκειται να αλλάξει καθώς οι δορυφόροι υπόσχονται χαρακτηριστικά που δεν μπορούν να ανταγωνιστούν τα επίγεια δίκτυα, με αποτέλεσμα την ενοποίηση των UAV με τις δορυφορικές επικοινωνίες. Ωστόσο, τα πράγματα είναι ασαφή και οι κίνδυνοι που ενέχουν είτε από την άποψη των προσωπικών δεδομένων είτε από την ασφάλεια και την υγεία μπορούν να λειτουργήσουν ως εμπόδιο στην ανάπτυξη και την αναβάθμιση των επικοινωνιών.The need for immediate contribution, response, and accuracy of results has led to the entry of drones and especially Unmanned Aerial Vehicles (UAVs) as new technological vehicles. However, the integration of such a colossal technological acquisition is by no means an easy task. Many requirements appear in various areas such as telecommunications, payload problems that the UAV must carry, and operations plans, requirements that must be met to avoid safety issues, collision avoidance, unstable connections, and so more. The purpose of this thesis is to study as best as possible and most effectively the contribution of satellite communications to achieve reliable and durable Unmanned Aerial Vehicles (UAVs) operations. A three-level analysis will be presented which will concern the Design, Modeling, and Analysis of satellite communications in combination with UAV operations in a way where efficiency of the link will be maximum. After all, an experiment will take place that results and parameters used will be discussed in order to compute the efficiency of the link budget. It is important to know that cellular communications have so far played the most important and accurate role in both terrestrial and air communications. This is about to change as satellites promise features that cannot compete with terrestrial networks, resulting in the integration of UAVs with satellite communications. However, things are unclear, and the risks posed either from the point of view of personal data or from safety and health can act as an obstacle in developing and upgrading communications

    Routing protocol for V2X communications for Urban VANETs

    Get PDF
    Intelligent Transportation Systems (ITSs) have been attracting tremendous attention in both academia and industry due to emerging applications that pave the way towards safer enjoyable journeys and inclusive digital partnerships. Undoubtedly, these ITS applications will demand robust routing protocols that not only focus on Inter-Vehicle Communications but also on providing fast, reliable, and secure access to the infrastructure. This thesis aims mainly to introduce the challenges of data packets routing through urban environment using the help of infrastructure. Broadcasting transmission is an essential operational technique that serves a broad range of applications which demand different restrictive QoS provisioning levels. Although broadcast communication has been investigated widely in highway vehicular networks, it is undoubtedly still a challenge in the urban environment due to the obstacles, such as high buildings. In this thesis, the Road-Topology based Broadcast Protocol (RTBP) is proposed, a distance and contention-based forwarding scheme suitable for both urban and highway vehicular environments. RTBP aims at assigning the highest forwarding priority to a vehicle, called a mobile repeater, having the greatest capability to send the packet in multiple directions. In this way, RTBP effectively reduces the number of competing vehicles and minimises the number of hops required to retransmit the broadcast packets around the intersections to cover the targeted area. By investigating the RTBP under realistic urban scenarios against well-known broadcast protocols, eMDR and TAF, that are dedicated to retransmitting the packets around intersections, the results showed the superiority of the RTBP in delivering the most critical warning information for 90% of vehicles with significantly lower delay of 58% and 70% compared to eMDR and TAF. The validation of this performance was clear when the increase in the number of vehicles. Secondly, a Fast and Reliable Hybrid routing (FRHR) protocol is introduced for efficient infrastructure access which is capable of handling efficient vehicle to vehicle communications. Interface to infrastructure is provided by carefully placed RoadSide Units (RSUs) which broadcast beacons in a multi-hop fashion in constrained areas. This enables vehicles proactively to maintain fresh minimum-delay routes to other RSUs while reactively discovering routes to nearby vehicles. The proposed protocol utilizes RSUs connected to the wired backbone network to relay packets toward remote vehicles. A vehicle selects an RSU to register with according to the expected mean delay instead of the device’s remoteness. The FRHR performance is evaluated against established infrastructure routing protocols, Trafroute, IGSR and RBVT-R that are dedicated to for urban environment, the results showed an improvement of 20% to 33% in terms of packet delivery ratio and lower latency particularly in sparse networks due to its rapid response to changes in network connectivity. Thirdly, focusing on increasing FRHR’s capability to provide more stable and durable routes to support the QoS requirements of expected wide-range ITS applications on the urban environment, a new route selection mechanism is introduced, aiming at selecting highly connected crossroads. The new protocol is called, Stable Infrastructure Routing Protocol (SIRP). Intensive simulation results showed that SIRP offers low end-to-end delay and high delivery ratio with varying traffic density, while resolving the problem of frequent link failures
    corecore