12 research outputs found

    Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network

    Get PDF
    Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate

    Prospectiva de seguridad de las redes de sensores inalámbricos

    Get PDF
    En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizan los trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación. Desde el punto de vista metodológico, este análisis se muestra a través de la visualización y estudio de trabajos indexados en bases de datos como IEEE, ACM, Scopus y Springer, con un rango de 7 años como ventana de observación, desde 2013 hasta 2019. Se obtuvieron un total de 4.728 publicaciones, con un alto índice de colaboración entre China e India. La investigación planteó desarrollos, como avances en los principios de seguridad y mecanismos de defensa, que han llevado al diseño de contramedidas en la detección de intrusiones. Por último, los resultados muestran el interés de la comunidad científica y empresarial por el uso de la inteligencia artificial y el aprendizaje automático (ML) para optimizar las medidas de rendimiento.In Wireless Sensor Networks (WSN), nodes are vulnerable to security attacks because they are installed in a harsh environment with limited power and memory, low processing power, and medium broadcast transmission. Therefore, identifying threats, challenges, and solutions of security and privacy is a talking topic today. This article analyzes the research work that has been carried out on the security mechanisms for the protection of WSN against threats and attacks, as well as the trends that emerge in other countries combined with future research lines. From the methodological point of view, this analysis is shown through the visualization and study of works indexed in databases such as IEEE, ACM, Scopus, and Springer, with a range of 7 years as an observation window, from 2013 to 2019. A total of 4,728 publications were obtained, with a high rate of collaboration between China and India. The research raised developments, such as advances in security principles and defense mechanisms, which have led to the design of countermeasures in intrusion detection. Finally, the results show the interest of the scientific and business community in the use of artificial intelligence and machine learning (ML) to optimize performance measurements

    Space Security 2008

    Get PDF
    Provides data and analysis on space activities in 2007 and their cumulative impact on security issues, including space laws, policies, and doctrines; civil space programs and global utilities; commercial uses; and environmental and military issues

    Cyber Threats and NATO 2030: Horizon Scanning and Analysis

    Get PDF
    The book includes 13 chapters that look ahead to how NATO can best address the cyber threats, as well as opportunities and challenges from emerging and disruptive technologies in the cyber domain over the next decade. The present volume addresses these conceptual and practical requirements and contributes constructively to the NATO 2030 discussions. The book is arranged in five short parts...All the chapters in this book have undergone double-blind peer review by at least two external experts.https://scholarworks.wm.edu/asbook/1038/thumbnail.jp

    The New Way of War: Is There A Duty to Use Drones?

    Get PDF
    Part I of this Article briefly describes the newest battlespace occupants. Robotic systems have been taking active part in combat. They now inhabit the air, the land, and the sea. They carry out missions ranging from surveillance and bomb disposal to “destroy and disable.” Part II examines the relevant principles of LOAC. It argues that drones are not, per se, unlawful under LOAC. Rather, the critical question is the same for drones as for other types of weapons, i.e., whether the specific use of the weapon complies with LOAC. In this context, the weapon must be deployed in accordance with LOAC’s fundamental principles of humanity, proportionality, distinction, taking precautions, and military necessity. Even if a specific type of weapon is not unlawful per se (or has not been specifically prohibited by particular treaties), it may not be used improperly, e.g., in a manner that would run afoul of these principles. Part III applies the principles of LOAC to drones. First, it analyzes the general trajectories of the development of new weapons throughout human history, which has involved trading off between three main considerations, namely distance, accuracy, and lethality. Second, it examines the rise of precision-guided munitions as an attempt to balance these three considerations, increasing military efficiency while minimizing harm to civilians and civilian objects. Part IV discusses the ability of drones to combine both remote exercise of force and high accuracy to reduce lethality. Part IV also closely examines both the promised benefits that the use of drones may bring to battlespace and the challenges to their deployment. Part V returns to the question of whether states and their military commanders have an obligation to use drones in the context of an armed conflict. It argues that although there are no treaties that deal specifically with the use of drones in armed conflict and no customary norms obligating the use of drones, such a duty may be derived from the cardinal principles of the law of armed conflict. It suggests that such an interpretation is merited if we accept that drones offer the possibility of a more humane war by combining remote and accurate use of force to reduce lethality among both friendly forces and innocent civilians. Part V concludes by setting out further challenges that ought to receive careful attention in developing and elaborating on the obligation to use drones in the battlefield

    MUSME 2011 4 th International Symposium on Multibody Systems and Mechatronics

    Full text link
    El libro de actas recoge las aportaciones de los autores a través de los correspondientes artículos a la Dinámica de Sistemas Multicuerpo y la Mecatrónica (Musme). Estas disciplinas se han convertido en una importante herramienta para diseñar máquinas, analizar prototipos virtuales y realizar análisis CAD sobre complejos sistemas mecánicos articulados multicuerpo. La dinámica de sistemas multicuerpo comprende un gran número de aspectos que incluyen la mecánica, dinámica estructural, matemáticas aplicadas, métodos de control, ciencia de los ordenadores y mecatrónica. Los artículos recogidos en el libro de actas están relacionados con alguno de los siguientes tópicos del congreso: Análisis y síntesis de mecanismos ; Diseño de algoritmos para sistemas mecatrónicos ; Procedimientos de simulación y resultados ; Prototipos y rendimiento ; Robots y micromáquinas ; Validaciones experimentales ; Teoría de simulación mecatrónica ; Sistemas mecatrónicos ; Control de sistemas mecatrónicosUniversitat Politècnica de València (2011). MUSME 2011 4 th International Symposium on Multibody Systems and Mechatronics. Editorial Universitat Politècnica de València. http://hdl.handle.net/10251/13224Archivo delegad

    XL Jornadas de Automática: libro de actas: Ferrol, 4-6 de septiembre de 2019

    Get PDF

    Workshop on Microwave Power Transmission and Reception. Workshop Paper Summaries

    Get PDF
    Microwave systems performance and phase control are discussed. Component design and reliability are highlighted. The power amplifiers, radiating elements, rectennas, and solid state configurations are described. The proper sizing of microwave transmission systems is also discussed

    Solar Power Satellite Microwave Transmission and Reception

    Get PDF
    Numerous analytical and experimental investigations related to SPS microwave power transmission and reception are reported. Aspects discussed include system performance, phase control, power amplifiers, radiating elements, rectenna, solid state configurations, and planned program activities
    corecore