140 research outputs found
A Study on Techniques/Algorithms used for Detection and Prevention of Security Attacks in Cognitive Radio Networks
In this paper a detailed survey is carried out on the taxonomy of Security Issues, Advances on Security Threats and Countermeasures ,A Cross-Layer Attack, Security Status and Challenges for Cognitive Radio Networks, also a detailed survey on several Algorithms/Techniques used to detect and prevent SSDF(Spectrum Sensing Data Falsification) attack a type of DOS (Denial of Service) attack and several other  Network layer attacks in Cognitive Radio Network or Cognitive Radio Wireless Sensor Node Networks(WSNN’s) to analyze the advantages and disadvantages of those existing algorithms/techniques
Detection And Prevention Of Types Of Attacks Using Machine Learning Techniques In Cognitive Radio Networks
A number of studies have been done on several types of data link and network layer attacks and defenses for CSS in CRNs, but there are still a number of challenges unsolved and open issues waiting for solutions. Specifically, from the perspective of attackers, when launching the attack, users have to take into account of the factors of attack gain, attack cost and attack risk, together.  From the perspective of defenders, there are also three aspects deserving consideration: defense reliability, defense efficiency and defense universality. The attacks and defenses are mutually coupled from each other. Attackers need to adjust their strategies to keep their negative effects on final decisions and avoid defenders’ detection, while defenders have to learn and analyze attack behaviors and designs effective defense rules. Indeed, attack and defense ought to be considered together. the proposed methodology overcomes the problems of several data link and network layer attacks and it effects in CSS(Co-operative Spectrum Sensing) of CNRs using Machine Learning based Defense, Cross layers optimization techniques and Defence based Prevention mechanisms
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Globally, the external Internet is increasingly being connected to the
contemporary industrial control system. As a result, there is an immediate need
to protect the network from several threats. The key infrastructure of
industrial activity may be protected from harm by using an intrusion detection
system (IDS), a preventive measure mechanism, to recognize new kinds of
dangerous threats and hostile activities. The most recent artificial
intelligence (AI) techniques used to create IDS in many kinds of industrial
control networks are examined in this study, with a particular emphasis on
IDS-based deep transfer learning (DTL). This latter can be seen as a type of
information fusion that merge, and/or adapt knowledge from multiple domains to
enhance the performance of the target task, particularly when the labeled data
in the target domain is scarce. Publications issued after 2015 were taken into
account. These selected publications were divided into three categories:
DTL-only and IDS-only are involved in the introduction and background, and
DTL-based IDS papers are involved in the core papers of this review.
Researchers will be able to have a better grasp of the current state of DTL
approaches used in IDS in many different types of networks by reading this
review paper. Other useful information, such as the datasets used, the sort of
DTL employed, the pre-trained network, IDS techniques, the evaluation metrics
including accuracy/F-score and false alarm rate (FAR), and the improvement
gained, were also covered. The algorithms, and methods used in several studies,
or illustrate deeply and clearly the principle in any DTL-based IDS subcategory
are presented to the reader
Sensors and Systems for Indoor Positioning
This reprint is a reprint of the articles that appeared in Sensors' (MDPI) Special Issue on “Sensors and Systems for Indoor Positioning". The published original contributions focused on systems and technologies to enable indoor applications
Recommended from our members
Interference Aware Cognitive Femtocell Networks
Femtocells Access Points (FAP) are low power, plug and play home base stations which are designed to extend the cellular radio range in indoor environments where macrocell coverage is generally poor. They offer significant increases in data rates over a short range, enabling high speed wireless and mobile broadband services, with the femtocell network overlaid onto the macrocell in a dual-tier arrangement. In contrast to conventional cellular systems which are well planned, FAP are arbitrarily installed by the end users and this can create harmful interference to both collocated femtocell and macrocell users. The interference becomes particularly serious in high FAP density scenarios and compromises the ensuing data rate. Consequently, effective management of both cross and co-tier interference is a major design challenge in dual-tier networks.
Since traditional radio resource management techniques and architectures for single-tier systems are either not applicable or operate inefficiently, innovative dual-tier approaches to intelligently manage interference are required. This thesis presents a number of original contributions to fulfill this objective including, a new hybrid cross-tier spectrum sharing model which builds upon an existing fractional frequency reuse technique to ensure minimal impact on the macro-tier resource allocation. A new flexible and adaptive virtual clustering framework is then formulated to alleviate co-tier interference in high FAP densities situations and finally, an intelligent coverage extension algorithm is developed to mitigate excessive femto-macrocell handovers, while upholding the required quality of service provision.
This thesis contends that to exploit the undoubted potential of dual-tier, macro-femtocell architectures an interference awareness solution is necessary. Rigorous evidence confirms that noteworthy performance improvements can be achieved in the quality of the received signal and throughput by applying cognitive methods to manage interference
Between State and Transnational Community: U.S.-Japan Technoscientific Diplomacy in Earth Observation
This dissertation examines intergovernmental collaboration in science and technology. In particular, it ventures into a new area of theoretical and empirical inquiry by investigating how scientists and engineers, working on behalf of different states, built an international remote-sensing system and created knowledge about the earth in the absence of the shared social, political, and cultural resources that would have been made available by a shared state or other shared authority, such as an international organization or treaty regime. In contrast to two prominent interpretations of scientific activity in the international arena, namely science as an idealist epistemic community and science as a Hobbesian imperial endeavor, the dissertation offers an explanatory interpretation that accounts for the creation of scientific knowledge and the development of international order by analyzing U.S.-Japan collaboration in remote sensing as a kind of international negotiation that I call "technoscientific diplomacy." Through this technoscientific diplomacy, U.S. and Japan scientists and engineers, working on behalf of their governments, accomplished something that had never been previously accomplished: they developed and operated in near-real time a space-based remote-sensing instrument, its ground data and information system, and an international political economy of scientific data, all under the management of two states
Trusted Artificial Intelligence in Manufacturing; Trusted Artificial Intelligence in Manufacturing
The successful deployment of AI solutions in manufacturing environments hinges on their security, safety and reliability which becomes more challenging in settings where multiple AI systems (e.g., industrial robots, robotic cells, Deep Neural Networks (DNNs)) interact as atomic systems and with humans. To guarantee the safe and reliable operation of AI systems in the shopfloor, there is a need to address many challenges in the scope of complex, heterogeneous, dynamic and unpredictable environments. Specifically, data reliability, human machine interaction, security, transparency and explainability challenges need to be addressed at the same time. Recent advances in AI research (e.g., in deep neural networks security and explainable AI (XAI) systems), coupled with novel research outcomes in the formal specification and verification of AI systems provide a sound basis for safe and reliable AI deployments in production lines. Moreover, the legal and regulatory dimension of safe and reliable AI solutions in production lines must be considered as well. To address some of the above listed challenges, fifteen European Organizations collaborate in the scope of the STAR project, a research initiative funded by the European Commission in the scope of its H2020 program (Grant Agreement Number: 956573). STAR researches, develops, and validates novel technologies that enable AI systems to acquire knowledge in order to take timely and safe decisions in dynamic and unpredictable environments. Moreover, the project researches and delivers approaches that enable AI systems to confront sophisticated adversaries and to remain robust against security attacks. This book is co-authored by the STAR consortium members and provides a review of technologies, techniques and systems for trusted, ethical, and secure AI in manufacturing. The different chapters of the book cover systems and technologies for industrial data reliability, responsible and transparent artificial intelligence systems, human centered manufacturing systems such as human-centred digital twins, cyber-defence in AI systems, simulated reality systems, human robot collaboration systems, as well as automated mobile robots for manufacturing environments. A variety of cutting-edge AI technologies are employed by these systems including deep neural networks, reinforcement learning systems, and explainable artificial intelligence systems. Furthermore, relevant standards and applicable regulations are discussed. Beyond reviewing state of the art standards and technologies, the book illustrates how the STAR research goes beyond the state of the art, towards enabling and showcasing human-centred technologies in production lines. Emphasis is put on dynamic human in the loop scenarios, where ethical, transparent, and trusted AI systems co-exist with human workers. The book is made available as an open access publication, which could make it broadly and freely available to the AI and smart manufacturing communities
Robot Manipulators
Robot manipulators are developing more in the direction of industrial robots than of human workers. Recently, the applications of robot manipulators are spreading their focus, for example Da Vinci as a medical robot, ASIMO as a humanoid robot and so on. There are many research topics within the field of robot manipulators, e.g. motion planning, cooperation with a human, and fusion with external sensors like vision, haptic and force, etc. Moreover, these include both technical problems in the industry and theoretical problems in the academic fields. This book is a collection of papers presenting the latest research issues from around the world
- …