25 research outputs found

    Simulating MIMT Attackers' Strategies in VANET to Secure ITS in Smart Cities via Multiverse Optimization-based Hybrid Routing Approach

    Get PDF
    The connection between moving vehicles and stationary Road Side Units is made possible by VANET technology, which is an essential component of Intelligent Transportation Systems. Vanet based intelligent transportation system (ITS) security is major issue in present days. MIMT Attackers' Strategies are taken into account to test the security of VANET based ITS system in present research paper. The major objective of research paper is to evaluate the potential of security model in case of different type of message dropping and delay attack. It is observed that there is probability of message delay, message drop, and message tampering attack in VANET based ITS system. Due to such attacks there is huge impact on content delivery ratio, packet delay and dropping. Thus proposed hybrid routing approach that is considering Multi-verse optimization has been used to simulate the Quantifying MIMT attacks. In present research, Vanet security in case of intelligent transportation system in smart cities has been considered

    Система управління та моніторингу безпілотного літального апарату. Підсистема моніторингу (компл.)

    Get PDF
    Робота публікується згідно наказу Ректора НАУ від 27.05.2021 р. №311/од "Про розміщення кваліфікаційних робіт здобувачів вищої освіти в репозиторії університету". Керівник роботи: д.т.н., професор, зав. кафедри авіаційних комп’ютерно-інтегрованих комплексів, Синєглазов Віктор МихайловичRecently, unmanned aviation has been rapidly developing. The development of unmanned aerial systems based on unmanned aerial vehicles is currently carried out by almost all industrialized countries of the world. Until recently, UAVs had a military purpose, now the use of UAVs is effective both in military and civilian tasks, for example, in combating the consequences of emergencies, natural disasters, agricultural applications, reconnaissance and aerial photography. The impetus for the development of unmanned aviation worldwide was the need for light, relatively cheap aircraft with high maneuverability characteristics and capable of performing a wide range of tasks. Unmanned aerial vehicles are successfully used in military operations around the world, and at the same time they successfully perform civilian tasks. Today, most of the existing unmanned aerial vehicles are piloted manually, using remote controls operating on radio channels. When manually piloting Unmanned aerial vehicles, there are difficulties associated with pilot training, insufficient operating range, and weather restrictions. UAV control is the task of a well-trained professional. For example, in the U.S. Army, UAV operators become active duty Air Force pilots after a year of preparation and training. In many aspects, it is more difficult than piloting an aircraft and, as is known, most accidents of unmanned aircraft are due to pilot-operator errors and mechanical failures. According to the official data provided for 2012, 70 unmanned aircraft crashed in the US Air Force.Останнім часом стрімко розвивається безпілотна авіація. Розробкою безпілотних авіаційних систем на базі безпілотних літальних апаратів в даний час займаються практично всі промислово розвинені країни світу. До недавнього часу БПЛА мали військове призначення, зараз використання БПЛА ефективно як в військові та цивільні завдання, наприклад, у боротьбі з наслідками надзвичайних ситуацій, стихійних лих, застосування в сільському господарстві, розвідка та аерофотозйомка. Поштовхом до розвитку безпілотної авіації в усьому світі стала потреба в легких, відносно дешевих літальних апаратах з високими маневреними характеристиками, здатних виконувати широкий спектр завдань. Безпілотні літальні апарати успішно використовуються у військових діях по всьому світу, і в той же час вони успішно виконують цивільні завдання. Сьогодні більшість існуючих безпілотних літальних апаратів управляються вручну, за допомогою пультів дистанційного керування, що працюють по радіоканалах. При ручному пілотуванні безпілотних літальних апаратів виникають труднощі, пов’язані з підготовкою пілотів, недостатньою дальністю польоту та погодними обмеженнями. Керування БПЛА – це завдання добре підготовленого професіонала. Наприклад, в армії США оператори БПЛА стають активними пілотами ВПС після року підготовки та навчання. У багатьох аспектах це складніше, ніж пілотування літака, і, як відомо, більшість аварій безпілотних літальних апаратів відбувається через помилки пілота-оператора та механічні несправності. За офіційними даними, наданими за 2012 рік, у ВПС США розбилося 70 безпілотних літаків

    Randomness, Age, Work: Ingredients for Secure Distributed Hash Tables

    Get PDF
    Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource location and routing. DHTs basically provide two main functions: saving (key, value) records in a network environment and, given a key, find the node responsible for it, optionally retrieving the associated value. However, all predominant DHT designs suffer a number of security flaws that expose nodes and stored data to a number of malicious attacks, ranging from disrupting correct DHT routing to corrupting data or making it unavailable. Thus even if DHTs are a standard layer for some mainstream systems (like BitTorrent or KAD clients), said vulnerabilities may prevent more security-aware systems from taking advantage of the ease of indexing and publishing on DHTs. Through the years a variety of solutions to the security flaws of DHTs have been proposed both from academia and practitioners, ranging from authentication via Central Authorities to social-network based ones. These solutions are often tailored to DHT specific implementations, simply try to mitigate without eliminating hostile actions aimed at resources or nodes. Moreover all these solutions often sports serious limitations or make strong assumptions on the underlying network. We present, after after providing a useful abstract model of the DHT protocol and infrastructure, two new primitives. We extend a “standard” proof-of-work primitive making of it also a “proof of age” primitive (informally, allowing a node to prove it is “sufficiently old”) and a “shared random seed” primitive (informally, producing a new, shared, seed that was completely unpredictable in a “sufficiently remote” past). These primitives are then integrated into the basic DHT model obtaining an “enhanced” DHT design, resilient to many common attacks. This work also shows how to adapt a Block Chain scheme – a continuously growing list of records (or blocks) protected from alteration or forgery – to provide a possible infrastructure for our proposed secure design. Finally a working proof-of-concept software implementing an “enhanced” Kademlia-based DHT is presented, together with some experimental results showing that, in practice, the performance overhead of the additional security layer is more than tolerable. Therefore this work provides a threefold contribution. It describes a general set of new primitives (adaptable to any DHT matching our basic model) achieving a secure DHT; it proposes an actionable design to attain said primitives; it makes public a proof-of-concept implementation of a full “enhanced” DHT system, which a preliminary performance evaluation shows to be actually usable in practice

    Fixed chain-based wireless sensor network for intelligent transportation systems

    Get PDF
    Wireless Sensor Networks (WSNs) are distributed and interconnected wirelessly sensors that are used in a variety of fields of our daily life, such as the manufacturing, utility operations and traffic monitoring. Many WSN applications come with some technical weaknesses and issues, especially when they are used in Intelligent Transportation Systems (ITS). For ITS applications that use a fixed chain topology which contains road studs deployed at ground level, there are some challenges related to radio propagation, energy constraints and the Media Access Control (MAC) protocol. This thesis develops a ground level radio propagation model for communication between road studs, and energy efficiency metrics to manage the resources to overcome the energy constraints, as well as a MAC protocol compatible with chain topology and ground level communication. For the challenges of the physical layer, this thesis investigates the use of a WSN for communicating between road-based nodes. These nodes are situated at ground level, and two-way wireless communication is required between the nodes and from the nodes to a roadside control unit. Field measurements have been carried out to examine the propagation close to the ground to determine the maximum distance between road-based nodes as a function of the antenna height. The results show that for a frequency of 2.4 GHz, a range of up to 8m is achievable with 2mW equivalent isotropically radiated power (EIRP). An empirical near-ground level radio propagation model has been derived, and the predicted results from this model are shown to match closely to the measured results. Since wireless sensor networks have power constraints, green energy efficiency metrics have been proposed for low-power wireless sensors operating at ground level. A numerical analysis is carried out to investigate the utilisation of the green energy efficiency metrics for ground level communication in wireless sensor networks. The proposed metrics have been developed to calculate the optimal sensor deployment, antenna height and energy efficiency level for the near ground wireless sensor. As an application of the proposed metrics, the relationship between the energy efficiency and the spacing between the wireless sensor nodes has been studied. The results provide guidance for energy efficient deployment of near ground level wireless sensors. To manage the communication between large numbers of nodes deployed on a chain topology, this research presents a time division multiple access (TDMA) MAC protocol that is specifically designed for applications requiring periodic sensing of the sensor field. Numerical analysis has been conducted to investigate the optimum transmission scheduling based on the signal-to-interference-plus-noise-ratio (SINR) for ground level propagation model applied on wireless chain topology. The optimised transmission schedule considers the SINR value to enable simultaneous transmission from multiple nodes. The most significant advantages of this approach are reduced delay and improved Packet Received Ratio (PRR). Simulation is performed to evaluate the proposed protocol for intelligent transport system applications. The simulation results validate the MAC protocol for a fixed chain topology compared with similar protocols

    Molecular phylogeny of horseshoe crab using mitochondrial Cox1 gene as a benchmark sequence

    Get PDF
    An effort to assess the utility of 650 bp Cytochrome C oxidase subunit I (DNA barcode) gene in delineating the members horseshoe crabs (Family: xiphosura) with closely related sister taxa was made. A total of 33 sequences were extracted from National Center for Biotechnological Information (NCBI) which include horseshoe crabs, beetles, common crabs and scorpion sequences. Constructed phylogram showed beetles are closely related with horseshoe crabs than common crabs. Scorpion spp were distantly related to xiphosurans. Phylogram and observed genetic distance (GD) date were also revealed that Limulus polyphemus was closely related with Tachypleus tridentatus than with T.gigas. Carcinoscorpius rotundicauda was distantly related with L.polyphemus. The observed mean Genetic Distance (GD) value was higher in 3rd codon position in all the selected group of organisms. Among the horseshoe crabs high GC content was observed in L.polyphemus (38.32%) and lowest was observed in T.tridentatus (32.35%). We conclude that COI sequencing (barcoding) could be used in identifying and delineating evolutionary relatedness with closely related specie

    Crab and cockle shells as heterogeneous catalysts in the production of biodiesel

    Get PDF
    In the present study, the waste crab and cockle shells were utilized as source of calcium oxide to transesterify palm olein into methyl esters (biodiesel). Characterization results revealed that the main component of the shells are calcium carbonate which transformed into calcium oxide upon activated above 700 °C for 2 h. Parametric studies have been investigated and optimal conditions were found to be catalyst amount, 5 wt.% and methanol/oil mass ratio, 0.5:1. The waste catalysts perform equally well as laboratory CaO, thus creating another low-cost catalyst source for producing biodiesel. Reusability results confirmed that the prepared catalyst is able to be reemployed up to five times. Statistical analysis has been performed using a Central Composite Design to evaluate the contribution and performance of the parameters on biodiesel purity
    corecore