39,764 research outputs found
A novel multi-fold security framework for cognitive radio wireless ad-hoc networks
Cognitive Radio (CR) Technology has emerged as a smart and intelligent technology to address the problem of spectrum scarcity and its under-utilization. CR nodes sense the environment for vacant channels, exchange control information, and agree upon free channels list (FCL) to use for data transmission and conclusion. CR technology is heavily dependent on the control channel to dialogue on the exchanged control information which is usually in the Industrial-Scientific-Medical (ISM) band. As the ISM band is publically available this makes the CR network more prone to security vulnerabilities and flaws. In this paper a novel multi-fold security framework for cognitive radio wireless ad-hoc networks has been proposed. Multiple security levels, such as, encryption of beacon frame and privately exchanging the FCL, and the dynamic and adaptive behaviour of the framework makes the proposed protocol more resilient and secure against the traditional security attacks when compared with existing protocols
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
Security protocols are often found to be flawed after their deployment. We
present an approach that aims at the neutralization or mitigation of the
attacks to flawed protocols: it avoids the complete dismissal of the interested
protocol and allows honest agents to continue to use it until a corrected
version is released. Our approach is based on the knowledge of the network
topology, which we model as a graph, and on the consequent possibility of
creating an interference to an ongoing attack of a Dolev-Yao attacker, by means
of non-collaboration actuated by ad-hoc benign attackers that play the role of
network guardians. Such guardians, positioned in strategical points of the
network, have the task of monitoring the messages in transit and discovering at
runtime, through particular types of inference, whether an attack is ongoing,
interrupting the run of the protocol in the positive case. We study not only
how but also where we can attempt to defend flawed security protocols: we
investigate the different network topologies that make security protocol
defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
sUAS Swarm Navigation using Inertial, Range Radios and Partial GNSS
Small Unmanned Aerial Systems (sUAS) operations are increasing in demand and complexity. Using multiple cooperative sUAS (i.e. a swarm) can be beneficial and is sometimes necessary to perform certain tasks (e.g., precision agriculture, mapping, surveillance) either independent or collaboratively. However, controlling the flight of multiple sUAS autonomously and in real-time in a challenging environment in terms of obstacles and navigation requires highly accurate absolute and relative position and velocity information for all platforms in the swarm. This information is also necessary to effectively and efficiently resolve possible collision encounters between the sUAS. In our swarm, each platform is equipped with a Global Navigation Satellite System (GNSS) sensor, an inertial measurement unit (IMU), a baro-altimeter and a relative range sensor (range radio). When GNSS is available, its measurements are tightly integrated with IMU, baro-altimeter and range-radio measurements to obtain the platform’s absolute and relative position. When GNSS is not available due to external factors (e.g., obstructions, interference), the position and velocity estimators switch to an integrated solution based on IMU, baro and relative range meas-urements. This solution enables the system to maintain an accurate relative position estimate, and reduce the drift in the swarm’s absolute position estimate as is typical of an IMU-based system.
Multiple multi-copter data collection platforms have been developed and equipped with GNSS, inertial sensors and range radios, which were developed at Ohio University. This paper outlines the underlying methodology, the platform hardware components (three multi-copters and one ground station) and analyzes and discusses the performance using both simulation and sUAS flight test data
Empowering local governments to make a disaster resilient built environment within Sri Lankan Cities
Urban areas are growing very rapidly all over the world, particularly in developing countries.
As a result of rapid urbanisation, the world’s population is increasingly concentrated in large
cities leading to unplanned urban development with inappropriate and poor quality housing,
infrastructure and services. This excessive unplanned urban growth leads to various physical,
social and economic vulnerabilities. As a result, the consequences of disasters are highly
detrimental when they occur in urban environments. Thus, it has become necessary to
strengthen the resilience of cities to disasters. The built environment provides a core to many
human activities and plays a critical role in any city. Thus, it is necessary to develop the built
environment with an effective degree of resilience, in order to withstand and adapt to the
threats of disasters. This requires a serious effort to be made by various stakeholders including
governmental and non-governmental institutions. As local governments are responsible for
local area development, they have a key role to play in achieving the resilience of the cities
under their jurisdiction. Even though there is a growing concern on the role of the local
governments in making cities resilient, several incidents have been reported on the inadequate
contribution of local governments in taking the lead role of initiating risk reduction. In this
context, the research aims to explore and propose mechanisms to empower the local
governments to make cities resilient to disasters within the context of the built environment.
Accordingly this paper intends to analyse the challenges faced by the Sri Lankan local
governments in creating a disaster resilient built environment within their cities and to propose
the ways and means of addressing the challenges faced by the local governments. As such, the
paper proposes a set of recommendations to empower the Sri Lankan local governments in
facilitating city resilience building initiatives in the built environment contex
- …