1,639 research outputs found
Systems And Methods For Detecting Call Provenance From Call Audio
Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.Georgia Tech Research Corporatio
Whether and Where to Code in the Wireless Relay Channel
The throughput benefits of random linear network codes have been studied
extensively for wirelined and wireless erasure networks. It is often assumed
that all nodes within a network perform coding operations. In
energy-constrained systems, however, coding subgraphs should be chosen to
control the number of coding nodes while maintaining throughput. In this paper,
we explore the strategic use of network coding in the wireless packet erasure
relay channel according to both throughput and energy metrics. In the relay
channel, a single source communicates to a single sink through the aid of a
half-duplex relay. The fluid flow model is used to describe the case where both
the source and the relay are coding, and Markov chain models are proposed to
describe packet evolution if only the source or only the relay is coding. In
addition to transmission energy, we take into account coding and reception
energies. We show that coding at the relay alone while operating in a rateless
fashion is neither throughput nor energy efficient. Given a set of system
parameters, our analysis determines the optimal amount of time the relay should
participate in the transmission, and where coding should be performed.Comment: 11 pages, 12 figures, to be published in the IEEE JSAC Special Issue
on Theories and Methods for Advanced Wireless Relay
Systems architecture for the acquisition and preservation of wireless network traffic
Wireless networking provides a ready and cost effective solution for business applications. It has escalated in popularity mainly due to the ability to form computer networks without a wired based infrastructure. However, accompanying the widespread usage also comes the inherent prospect of criminal misuse, including unauthorized application and the launch of system attacks. This paper presents the testing of an innovative Wireless Forensic Model (WFM) system that provides capability for acquisition and preservation of wireless network traffic (802.11) frames by implementing a wireless drone architecture. It is thus a forensic readiness system providing available evidence for forensic investigation. The results show that the tested system has the ability to collect upwards of 90% of all frames, as well as evidence and detection of attacks conducted against the wireless network
Agile Data Offloading over Novel Fog Computing Infrastructure for CAVs
Future Connected and Automated Vehicles (CAVs) will be supervised by
cloud-based systems overseeing the overall security and orchestrating traffic
flows. Such systems rely on data collected from CAVs across the whole city
operational area. This paper develops a Fog Computing-based infrastructure for
future Intelligent Transportation Systems (ITSs) enabling an agile and reliable
off-load of CAV data. Since CAVs are expected to generate large quantities of
data, it is not feasible to assume data off-loading to be completed while a CAV
is in the proximity of a single Road-Side Unit (RSU). CAVs are expected to be
in the range of an RSU only for a limited amount of time, necessitating data
reconciliation across different RSUs, if traditional approaches to data
off-load were to be used. To this end, this paper proposes an agile Fog
Computing infrastructure, which interconnects all the RSUs so that the data
reconciliation is solved efficiently as a by-product of deploying the Random
Linear Network Coding (RLNC) technique. Our numerical results confirm the
feasibility of our solution and show its effectiveness when operated in a
large-scale urban testbed.Comment: To appear in IEEE VTC-Spring 201
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or
documenting processes, and actuators for enabling corrective actions in cases
of misconfigurations, failures, or dangerous events. With the advent of the
IoT, embedded controllers link these `things' to local networks that often are
of low power wireless kind, and are interconnected via gateways to some cloud
from the global Internet. Inter-networked sensors and actuators in the
industrial IoT form a critical subsystem while frequently operating under harsh
conditions. It is currently under debate how to approach inter-networking of
critical industrial components in a safe and secure manner.
In this paper, we analyze the potentials of ICN for providing a secure and
robust networking solution for constrained controllers in industrial safety
systems. We showcase hazardous gas sensing in widespread industrial
environments, such as refineries, and compare with IP-based approaches such as
CoAP and MQTT. Our findings indicate that the content-centric security model,
as well as enhanced DoS resistance are important arguments for deploying
Information Centric Networking in a safety-critical industrial IoT. Evaluation
of the crypto efforts on the RIOT operating system for content security reveal
its feasibility for common deployment scenarios.Comment: To be published at IEEE WF-IoT 201
A Regular Pattern of Timestamps Between Machines with Built-in System Time
This paper studied the effect of 15.6 ms time resolution where the collected timestamps are in a form of parallel dotted lines, instead of one straight line like in classical case. The dotted lines made the clock skew measurement of two devices to become incorrect as the measurement which normally follow the cluster of offsets but now follow the parallel dotted lines. Dotted lines pattern is required in order to understand how to correct the clock skew measurement on data containing dotted lines. To model the dotted lines pattern is through Dotted lines Grouping Method, a tools to find the characteristics of the dotted lines. The dotted lines grouping method was then tested data obtained from wired and wireless communication of two similar devices. The dotted line grouping method results equal maximum number of dot of 10 for both data, which indicated the robustness of the dotted lines grouping method
- …