85 research outputs found

    BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Get PDF
    This study is aimed at exploring why many economists propose a transfer scheme and debt mutualisation for the Eurozone. This would equip the Eurozone with better tools to deal with an economic shock, like the 2010-2012 sovereign debt crisis, thus making it more financially stable. After the theoretical presentation, the study presents a unique institutional design with an EU Treasury that manages debt mutualisation and a transfer scheme as well as other competences that address other present economic challenges. Crucial to the study are the issues of moral hazard and adverse selection that arise when thinking of European economic integration.L’objectiu del treball és explorar la raó per la qual molts economistes proposen un sistema de transferències fiscals i la mutualització del deute a l’Eurozona. Així se la dotaria amb eines més efectives per pal·liar un xoc econòmic, com la crisi del deute sobirà del 2010-2012. A continuació, es presenta un disseny institucional únic d’un Tresor de l’Euro que gestionaria les competències esmentades (i d’altres) per combatre alguns dels reptes econòmics actuals. El risc moral i de selecció adversa, qüestions que sorgeixen en pensar la drecera que ha de prendre la integració econòmica Europea, són cabdals per aquest estudi

    A pre-emptive multiple queue based congestion control for different traffic classes in WSN

    Get PDF
    Traffic in wireless sensor networks (WSN) exhibits a many-to-one pattern in which multiple source nodes send sensing data to a single sink node. Since bandwidth, processor and memory are highly constrained in WSN, packet loss is common when a great deal of traffic rushes to sink. The system must provide differentiated service to individual traffic classes. In this paper, a pre-emptive multiple queue based congestion control mechanism is proposed. To detect congestion and to provide QoS for high priority traffic multiple buffers are used. Using this mechanism, high system utilization, reduced packet waiting time, and reduced packet drop probability are achieved. An analytical model is developed to predict the performance of the proposed mechanism by calculating the performance measures including system throughput, drop probability of packets, and mean queue length. By comparing analytical and simulation results the effectiveness and accuracy of the model is demonstrated. Markovian process is used to develop the analytical model and ns-2 for evaluating the performance of the mechanism

    Maximum Production Of Transmission Messages Rate For Service Discovery Protocols

    Get PDF
    Minimizing the number of dropped User Datagram Protocol (UDP) messages in a network is regarded as a challenge by researchers. This issue represents serious problems for many protocols particularly those that depend on sending messages as part of their strategy, such us service discovery protocols. This paper proposes and evaluates an algorithm to predict the minimum period of time required between two or more consecutive messages and suggests the minimum queue sizes for the routers, to manage the traffic and minimise the number of dropped messages that has been caused by either congestion or queue overflow or both together. The algorithm has been applied to the Universal Plug and Play (UPnP) protocol using ns2 simulator. It was tested when the routers were connected in two configurations; as a centralized and de centralized. The message length and bandwidth of the links among the routers were taken in the consideration. The result shows Better improvement in number of dropped messages `among the routers

    Exploração de Covert Channels de Rede sobre comunicações IEEE 802.15.4

    Get PDF
    The advancements in information and communication technology in the past decades have been converging into a new communication paradigm in which everything is expected to be interconnected with the heightened pervasiveness and ubiquity of the Internet of Things (IoT) paradigm. As these technologies mature, they are increasingly finding its way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices continues to increase annually, up to tens of billions of connected devices, IoT devices continue to present severe cyber-security vulnerabilities, which are worsened by challenges such as scalability, heterogeneity, and their often scarce computing capacity. Network covert channels are increasingly being used to support malware with stealthy behaviours, aiming at exfiltrating data or to orchestrate nodes of a botnet in a cloaked fashion. Nevertheless, the attention to this problem regarding underlying and pervasive IoT protocols such as the IEEE 802.15.4 has been scarce. Therefore, in this Thesis, we aim at analysing the performance and feasibility of such covertchannel implementations upon the IEEE 802.15.4 protocol to support the development of new mechanisms and add-ons that can effectively contribute to improve the current state of-art of IoT systems which rely on such, or similar underlying communication technologies.Os avanços nas tecnologias de informação e comunicação nas últimas décadas têm convergido num novo paradigma de comunicação, onde se espera que todos os intervenientes estejam interconectados pela ubiquidade do paradigma da Internet of Things (Internet das Coisas). Com a maturação destas tecnologias, elas têm-se vindo a infiltrar em domínios cada vez mais sensíveis, como nas aplicações médicas e industriais, onde a confiabilidade da informação e cyber-segurança são um fator crítico. Num contexto onde o número de dispositivos IoT continua a aumentar anualmente, já na ordem das dezenas de biliões de dispositivos interconectados, estes continuam, contudo, a apresentar severas vulnerabilidades no campo da cyber-segurança, sendo que os desafios como a escalabilidade, heterogeneidade e, na maioria das vezes, a sua baixa capacidade de processamento, tornam ainda mais complexa a sua resolução de forma permanente. Os covert channels de rede são cada vez mais um meio de suporte a malwares que apresentam comportamentos furtivos, almejando a extração de informação sensível ou a orquestração de nós de uma botnet de uma forma camuflada. Contudo, a atenção dada a este problema em protocolos de rede IoT abrangentes como o IEEE 802.15.4, tem sido escassa. Portanto, nesta tese, pretende-se elaborar uma análise da performance e da viabilidade da implementação de covert channels em modelos de rede onde figura o protocolo IEEE 802.15.4 de forma a suportar o desenvolvimento de novos mecanismos e complementos que podem efetivamente contribuir para melhorar a ciber-segurança de sistemas IoT que dependem do suporte destas tecnologias de comunicação

    Simulation

    Get PDF
    In this paper, performance analysis of the Wireless and Wired computer networks through simulation has been attempted using OPNET as simulating tool. For wired networks, the performance parameters like delay and throughput have been investigated with varying transmission links and load balancers. The load-balancing has been analyzed through parameters like analysis of traffic sent and traffic received. While in wireless networks the metrics like delay, retransmission attempts and throughput have been estimated with varying physical characteristic and buffer size. From the obtained results, it is gathered that performance of the wired networks is good if high speed Ethernet links like 1000 Base X and server-load balancing policy are used whereas the performance of Wireless LAN can be improved by fine tuning and properly choosing the WLAN parameters. For the tested simulation scenarios the performance is observed to be better with wireless networks using infra-red type physical characteristics and higher buffer size (1024Kb

    Distributed scheduling algorithms for LoRa-based wide area cyber-physical systems

    Get PDF
    Low Power Wide Area Networks (LPWAN) are a class of wireless communication protocols that work over long distances, consume low power and support low datarates. LPWANs have been designed for monitoring applications, with sparse communication from nodes to servers and sparser from servers to nodes. Inspite of their initial design, LPWANs have the potential to target applications with higher and stricter requirements like those of Cyber-Physical Systems (CPS). Due to their long-range capabilities, LPWANs can specifically target CPS applications distributed over a wide-area, which is referred to as Wide-Area CPS (WA-CPS). Augmenting WA-CPSs with wireless communication would allow for more flexible, low-cost and easily maintainable deployment. However, wireless communications come with problems like reduced reliability and unpredictable latencies, making them harder to use for CPSs. With this intention, this thesis explores the use of LPWANs, specifically LoRa, to meet the communication and control requirements of WA-CPSs. The thesis focuses on using LoRa due to its high resilience to noise, several communication parameters to choose from and a freely modifiable communication stack and servers making it ideal for research and deployment. However, LoRaWAN suffers from low reliability due to its ALOHA channel access method. The thesis posits that "Distributed algorithms would increase the protocol's reliability allowing it to meet the requirements of WA-CPSs". Three different application scenarios are explored in this thesis that leverage unexplored aspects of LoRa to meet their requirements. The application scenarios are delay-tolerant vehicular networks, multi-stakeholder WA-CPS deployments and water distribution networks. The systems use novel algorithms to facilitate communication between the nodes and gateways to ensure a highly reliable system. The results outperform state-of-art techniques to prove that LoRa is currently under-utilised and can be used for CPS applications.Open Acces

    Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    Get PDF

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions

    An open virtual testbed for industrial control system security research

    Get PDF
    ICS security has been a topic of scrutiny and research for several years, and many security issues are well known. However, research efforts are impeded by a lack of an open virtual industrial control system testbed for security research. This thesis describes a virtual testbed framework using Python to create discrete testbed components (including virtual devices and process simulators). This testbed is designed such that the testbeds are interoperable with real ICS devices and that the virtual testbeds can provide comparable ICS network behavior to a laboratory testbed. Two testbeds based on laboratory testbeds have been developed and have been shown to be interoperable with real industrial control systemequipment and vulnerable to attacks in the samemanner as a real system. Additionally, these testbeds have been quantitatively shown to produce traffic close to laboratory systems (within 90% similarity on most metrics)
    • …
    corecore