158,323 research outputs found
FlexRDZ: Autonomous Mobility Management for Radio Dynamic Zones
FlexRDZ is an online, autonomous manager for radio dynamic zones (RDZ) that
seeks to enable the safe operation of RDZs through real-time control of
deployed test transmitters. FlexRDZ leverages Hierarchical Task Networks and
digital twin modeling to plan and resolve RDZ violations in near real-time. We
prototype FlexRDZ with GTPyhop and the Terrain Integrated Rough Earth Model
(TIREM). We deploy and evaluate FlexRDZ within a simulated version of the Salt
Lake City POWDER testbed, a potential urban RDZ environment. Our simulations
show that FlexRDZ enables up to a 20 dBm reduction in mobile interference and a
significant reduction in the total power of leaked transmissions while
preserving the overall communication capabilities and uptime of test
transmitters. To our knowledge, FlexRDZ is the first autonomous system for RDZ
management.Comment: This work has been submitted to the IEEE for possible publication.
Copyright may be transferred without notice, after which this version may no
longer be accessibl
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure
AODV routing protocol in Ad Hoc networks. The considered system can be
vulnerable to several attacks because of mobility and absence of
infrastructure. While the disturbance is assumed to be of the black hole type,
we purpose a control named "PC-AODV-BH" in order to neutralize the effects of
malicious nodes. Such a protocol is obtained by coupling hash functions,
digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on
three performance metrics and taking into account the number of black hole
malicious nodesComment: submit 15 pages, 19 figures, 1 table, Journal Indexing team, AIRCC
201
- …