82 research outputs found

    Security Framework and Jamming Detection for Internet of Things

    Get PDF

    Network Science for IoT

    Get PDF
    The research work presented in this thesis is based on the concept and defintion of network that can spread in several and different real world contexts. Indeed, we can refer to a network in a telecommunications sense considering a collection of transmitters, receivers, and communication channels that send or are used to send information to one another. However, as a matter of fact, in nature there are other several examples of networks: the human brain is one of them. The relationship between the actors in Hollywood can be studied in terms of network as well, a generic social community can be compared to a network, eco-systems are networks of species. The recent Network Science aims at studying all these systems using a set of common mathematical methods. In the following of the thesis, we will focus on some of well known telecommunications networks issues using standard telecommunications procedures to address them, with relevant reference to video flow transmissions and management of electric vehicles networks. At the same time, different models aiming at reach the same goals in contexts that may differ from a telecommunications setup can be used. In more details, we will evaluate queueing systems, jamming problems, groups recognition in networks, and mobile computing using game theoretic approaches. It is worth noting that this aspect can be also seen in a reverse order. Indeed, we will discuss how standard telecommunications analysis can be used to investigate on problems not directly related to a telecommunications background. In particular, one of our future purposes is to investigate on the brain connectivity that is raising significant interest in the recent scientific society

    The use of computational geometry techniques to resolve the issues of coverage and connectivity in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) enhance the ability to sense and control the physical environment in various applications. The functionality of WSNs depends on various aspects like the localization of nodes, the strategies of node deployment, and a lifetime of nodes and routing techniques, etc. Coverage is an essential part of WSNs wherein the targeted area is covered by at least one node. Computational Geometry (CG) -based techniques significantly improve the coverage and connectivity of WSNs. This paper is a step towards employing some of the popular techniques in WSNs in a productive manner. Furthermore, this paper attempts to survey the existing research conducted using Computational Geometry-based methods in WSNs. In order to address coverage and connectivity issues in WSNs, the use of the Voronoi Diagram, Delaunay Triangulation, Voronoi Tessellation, and the Convex Hull have played a prominent role. Finally, the paper concludes by discussing various research challenges and proposed solutions using Computational Geometry-based techniques.Web of Science2218art. no. 700

    Vehicle Networks: Statistical and Game Theoretic Approaches to Their Evaluation and Design

    Get PDF
    Vehicle ad hoc networks (VANETs) have become a popular topic in modern research. The main advantages of these networks include: improved security, traffic optimization, and infotainment. However, deploying such networks in practice requires extensive infrastructure. To estimate the network load, one needs to have information about the network, such as the number of clusters, cluster size, etc. Since VANETs are formed by vehicles that rapidly change their location, the network topology is constantly changing, making its analysis by deterministic methods impossible. Therefore, in this dissertation, we use probability theory methods to obtain probability distributions of such fundamental network properties, such as the number of clusters, cluster size, and the number of disconnected vehicles in the case in which the vehicles are located on a highway. In previous articles, some of these characteristics are obtained only in terms of average values, while the total distributions remained unknown. The distribution of the largest cluster size is an important characteristic of the network. It is derived in the dissertation for the first time. We also study the distribution of the number of clusters and the size of the average cluster in the case of a 2D map with an almost arbitrary road topology. To the best of our knowledge, these results are the first for such a general map case. Studying these properties raises a number of new questions about how these network properties change over time. We obtain distributions of the network characteristics, such as the duration of communication between vehicles, and the duration of cluster existence. We also derive the probability that a cluster exists between two time moments, as well as other network properties. The obtained distributions are new in the case of the Markov channel model. The results regarding the distribution of cluster lifetime and the probability of cluster existence between two fixed time moments are obtained in the literature for the first time. This dissertation also addresses the security aspect of VANET. We consider single and multichannel anti-jamming games in the case in which two communicating vehicles are being pursued by the jammer, which tries to disrupt the communication. The optimal strategies of the vehicles and the jammer are described as the Nash equilibrium of this game. We prove theorems that express Nash equilibrium through communication parameters. The considered model with quadratic power term is new as well as the results regarding the Nash equilibrium in the single and multichannel cases. We also first examine performance of such state-of-the-art machine learning algorithms as Dueling Q-learning and Double Q-learning, which by trial and error, successfully converge to the Nash equilibrium, deduced theoretically

    Game Theory Meets Network Security and Privacy

    Get PDF
    This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches. A selected set of works are presented to highlight the application of game theory in order to address different forms of security and privacy problems in computer networks and mobile applications. The presented works are classified into six main categories based on their topics: security of the physical and MAC layers, application layer security in mobile networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, security problems, players, and game models are identified and the main results of selected works, such as equilibrium analysis and security mechanism designs are summarized. In addition, a discussion on advantages, drawbacks, and the future direction of using game theory in this field is provided. In this survey, we aim to provide a better understanding of the different research approaches for applying game theory to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking

    Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence

    Get PDF
    Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks
    corecore