36 research outputs found

    A Mixed-Integer Programming Approach for Jammer Placement Problems for Flow-Jamming Attacks on Wireless Communication Networks

    Get PDF
    In this dissertation, we study an important problem of security in wireless networks. We study different attacks and defense strategies in general and more specifically jamming attacks. We begin the dissertation by providing a tutorial introducing the operations research community to the various types of attacks and defense strategies in wireless networks. In this tutorial, we give examples of mathematical programming models to model jamming attacks and defense against jamming attacks in wireless networks. Later we provide a comprehensive taxonomic classification of the various types of jamming attacks and defense against jamming attacks. The classification scheme will provide a one stop location for future researchers on various jamming attack and defense strategies studied in literature. This classification scheme also highlights the areas of research in jamming attack and defense against jamming attacks which have received less attention and could be a good area of focus for future research. In the next chapter, we provide a bi-level mathematical programming model to study jamming attack and defense strategy. We solve this using a game-theoretic approach and also study the impact of power level, location of jamming device, and the number of transmission channels available to transmit data on the attack and defense against jamming attacks. We show that by increasing the number of jamming devices the throughput of the network drops by at least 7%. Finally we study a special type of jamming attack, flow-jamming attack. We provide a mathematical programming model to solve the location of jamming devices to increase the impact of flow-jamming attacks on wireless networks. We provide a Benders decomposition algorithm along with some acceleration techniques to solve large problem instances in reasonable amount of time. We draw some insights about the impact of power, location and size of the network on the impact of flow-jamming attacks in wireless networks

    A Mixed-Integer Programming Approach for Jammer Placement Problems for Flow-Jamming Attacks on Wireless Communication Networks

    Get PDF
    In this dissertation, we study an important problem of security in wireless networks. We study different attacks and defense strategies in general and more specifically jamming attacks. We begin the dissertation by providing a tutorial introducing the operations research community to the various types of attacks and defense strategies in wireless networks. In this tutorial, we give examples of mathematical programming models to model jamming attacks and defense against jamming attacks in wireless networks. Later we provide a comprehensive taxonomic classification of the various types of jamming attacks and defense against jamming attacks. The classification scheme will provide a one stop location for future researchers on various jamming attack and defense strategies studied in literature. This classification scheme also highlights the areas of research in jamming attack and defense against jamming attacks which have received less attention and could be a good area of focus for future research. In the next chapter, we provide a bi-level mathematical programming model to study jamming attack and defense strategy. We solve this using a game-theoretic approach and also study the impact of power level, location of jamming device, and the number of transmission channels available to transmit data on the attack and defense against jamming attacks. We show that by increasing the number of jamming devices the throughput of the network drops by at least 7%. Finally we study a special type of jamming attack, flow-jamming attack. We provide a mathematical programming model to solve the location of jamming devices to increase the impact of flow-jamming attacks on wireless networks. We provide a Benders decomposition algorithm along with some acceleration techniques to solve large problem instances in reasonable amount of time. We draw some insights about the impact of power, location and size of the network on the impact of flow-jamming attacks in wireless networks

    Building Novel VHF-Based Wireless Sensor Networks for the Internet of Marine Things

    Get PDF
    Traditional marine monitoring systems such as oceanographic and hydrographic research vessels use either wireless sensor networks with a limited coverage, or expensive satellite communication that is not suitable for small and mid-sized vessels. This paper proposes a novel Internet of Marine Things data acquisition and cartography system in the marine environment using Very High Frequency (VHF) available on the majority of ships. The proposed system is equipped with many sensors such as sea depth, temperature, wind speed and direction, and the collected data is sent to 5G edge cloudlets connected to sink/base station nodes on shore. The sensory data is ultimately aggregated at a central cloud on the internet to produce up to date cartography systems. Several observations and obstacles unique to the marine environment have been discussed and feed into the solutions presented. The impact of marine sparsity on the network is examined and a novel hybrid Mobile Ad-hoc/Delay Tolerant routing protocol is proposed to switch automatically between Mobile Ad-hoc Network and Delay Tolerant Network routing according to the network connectivity. The low rate data transmission offered by VHF radio has been investigated in terms of the network bottlenecks and the data collection rate achievable near the sinks. A data synchronization and transmission approach has also been proposed at the 5G network core using Information Centric Networks

    Implementation and Evaluation of A Low-Cost Intrusion Detection System For Community Wireless Mesh Networks

    Get PDF
    Rural Community Wireless Mesh Networks (WMN) can be great assets to rural communities, helping them connect to the rest of their region and beyond. However, they can be a liability in terms of security. Due to the ad-hoc nature of a WMN, and the wide variety of applications and systems that can be found in such a heterogeneous environment there are multiple points of intrusion for an attacker. An unsecured WMN can lead to privacy and legal problems for the users of the network. Due to the resource constrained environment, traditional Intrusion Detection Systems (IDS) have not been as successful in defending these wireless network environments, as they were in wired network deployments. This thesis proposes that an IDS made up of low cost, low power devices can be an acceptable base for a Wireless Mesh Network Intrusion Detection System. Because of the device's low power, cost and ease of use, such a device could be easily deployed and maintained in a rural setting such as a Community WMN. The proposed system was compared to a standard IDS solution that would not cover the entire network, but had much more computing power but also a higher capital cost as well as maintenance costs. By comparing the low cost low power IDS to a standard deployment of an open source IDS, based on network coverage and deployment costs, a determination can be made that a low power solution can be feasible in a rural deployment of a WMN

    Directional Link Management using In-Band Full-Duplex Free Space Optical Transceivers for Aerial Nodes

    Get PDF
    Free-space optical (FSO) communication has become very popular for wireless applications to complement and, in some cases, replace legacy radio-frequency for advantages like unlicensed band, spatial reuse, and enhanced security. Even though FSO can achieve very high bit-rate (tens of Gbps), range limitation due to high attenuation and weather dependency has always restricted its practical implementation to indoor application like data centers and outdoor application like Project Loon. Building-to-building communication, smart cars, and airborne drones are potential futuristic wireless communication sectors for mobile ad-hoc FSO networking. Increasing social media usage demands high-speed mobile connectivity for applications like video call and live video stream on the go. For these scenarios, implementation of in-band full-duplex FSO (IBFD-FSO) transceivers will potentially double the network capacity to improve performance and reliability of the communication link. In this work, we focus on implementing prototypes of FSO transceivers on mobile platform using both off-the-shelf and customized components. Current goal is to implement a prototype of IBFD-FSO transceiver using VCSEL as transmitter and PIN photodiode as receiver at 900 nm wavelength. We are considering atmospheric attenuation, FSO beam propagation model, geometry, and tiling of the components to optimize the link performance while keeping the package low-cost and mobile, ensuring connectivity to mass population. Eventually, our goal is to have communication between multiple airborne drones through IBFD-FSO transceivers by discovering each other and maintaining established link. Applications of this research is not only limited to the conceived idea of smart cities, but it can also have real impact on disaster management in times of wildfire or hurricane

    The Impact of Adaptation Delays on Routing Protocols forMobile Ad-Hoc Networks (MANETs)

    Get PDF
    MANETs are coping with major challenges such as the lack of infrastructure and mobility which causes networks topology to change dynamically. Due to limited resources, nodes have to collaborate and rely packets on the behalf of neighbors to reach their destinations forming multi-hop paths. The selection and maintenance of multi-hop paths is a challenging task as their stability and availability depend on the mobility of participating nodes, where paths used a few moments earlier would be rendered invalid due to ever changing topology. The purpose of a routing protocol is to establish and select valid paths between communicating nodes and repair or remove invalid ones. As mobility rate increases, routing protocols spend more time in path maintenance and less time in actual data communication, degrading network performance. This interaction among mobility, topology and routing performance is usually empirically studied through simulations. This dissertation will provide a novel deep analytical study of the root cause of performance degradation with mobility. This is accomplished by, firstly, studying how mobility impacts durations of topology paths called Topological modeling. Secondly, analyzing how routing protocols adapt to topology changes in Adaptability modeling which identifies AdaptationDelays representing the time taken by a routing protocol to translate a change in topology to logical information used in path selection. Combining the results from these two studies, performance models of routing protocols are obtained, which later is used to optimize its operation. This study is applied on two tree-based proactive routing protocols, the Optimized Link State Routing and the Multi-Meshed Tree

    Enabling and Understanding Failure of Engineering Structures Using the Technique of Cohesive Elements

    Get PDF
    In this paper, we describe a cohesive zone model for the prediction of failure of engineering solids and/or structures. A damage evolution law is incorporated into a three-dimensional, exponential cohesive law to account for material degradation under the influence of cyclic loading. This cohesive zone model is implemented in the finite element software ABAQUS through a user defined subroutine. The irreversibility of the cohesive zone model is first verified and subsequently applied for studying cyclic crack growth in specimens experiencing different modes of fracture and/or failure. The crack growth behavior to include both crack initiation and crack propagation becomes a natural outcome of the numerical simulation. Numerical examples suggest that the irreversible cohesive zone model can serve as an efficient tool to predict fatigue crack growth. Key issues such as crack path deviation, convergence and mesh dependency are also discussed

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
    corecore