4,872 research outputs found

    Resilience of multi-robot systems to physical masquerade attacks

    Full text link
    The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and security-critical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience.Accepted manuscrip

    Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model

    Full text link
    Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this resource allocation issue by constructing a game theoretic model. A defender and an attacker are players and the interaction is formulated as a trade-off between protecting targets and consuming resources. The action cost which is a necessary role of consuming resource, is considered in the proposed model. Additionally, a bounded rational behavior model (Quantal Response, QR), which simulates a human attacker of the adversarial nature, is introduced to improve the proposed model. To validate the proposed model, we compare the different utility functions and resource allocation strategies. The comparison results suggest that the proposed resource allocation strategy performs better than others in the perspective of utility and resource effectiveness.Comment: 14 pages, 12 figures, 41 reference

    Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions

    Full text link
    Traditional power grids are being transformed into Smart Grids (SGs) to address the issues in existing power system due to uni-directional information flow, energy wastage, growing energy demand, reliability and security. SGs offer bi-directional energy flow between service providers and consumers, involving power generation, transmission, distribution and utilization systems. SGs employ various devices for the monitoring, analysis and control of the grid, deployed at power plants, distribution centers and in consumers' premises in a very large number. Hence, an SG requires connectivity, automation and the tracking of such devices. This is achieved with the help of Internet of Things (IoT). IoT helps SG systems to support various network functions throughout the generation, transmission, distribution and consumption of energy by incorporating IoT devices (such as sensors, actuators and smart meters), as well as by providing the connectivity, automation and tracking for such devices. In this paper, we provide a comprehensive survey on IoT-aided SG systems, which includes the existing architectures, applications and prototypes of IoT-aided SG systems. This survey also highlights the open issues, challenges and future research directions for IoT-aided SG systems

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Multi-Agent Based Simulation of an Unmanned Aerial Vehicles System

    Get PDF
    The rapid growth of using Unmanned Aerial Vehicles (UAV) for civilian and military applications has promoted the development of research in many areas. Most of the unmanned aerial vehicles in use are manually controlled. Often, UAVs require highly trained pilot operators. Hence, the main challenge faced by researchers has been to make UAVs autonomous or semiautonomous. The goal of this research project is to develop and implement a simulation for a user-defined environment allowing UAVs to maneuver in free environments and obstacle-laden environments using Boid's algorithm of flocking with obstacle avoidance. The users are permitted to analyze the maneuvering area and coverage efficiency of the UAVs and to dynamically change environments. This project makes use of Boid's flocking algorithm to generate different kinds of movements for the flying agents, enabling the user to analyze the effectiveness of patrolling in that particular scenario. The number of UAVs and the type of environment are set by the user. The set number of UAVs moves as a flock or swarm inside the set environment by using Boid's rules of flocking: cohesion, alignment, and separation. The coverage efficiency of the UAVs in that particular environment is reported based on the ratio between the area covered and the time when the search time reaches a threshold. The advantages and feasibilities of the approach are discussed with the simulation results

    Community policing and young people: a critical insight into young people's perceptions in Leicester

    Get PDF
    The repercussions associated with young people's exclusion from policing can be detrimental. The police will lack a basic understanding of young people s problems, needs and expectations. In these situations, young people will be less inclined to report crimes and their own victimisation to the police, provide intelligence, and participate in the criminal justice system. This study is intended to provide a critical appraisal of young people s perceptions of Police and Community Support Officers (PCSOs) and community policing in Leicester, in an effort to delineate the implications of their exclusion from local policing and crime related issues. Community policing is a well-known policing philosophy, particularly for repairing police public relations through engagement and problem solving. The findings demonstrate that despite the fundamental benefits associated with community policing, conventional methods of engagement and problem solving have failed to reach out to young people who are, nevertheless, particularly enthusiastic about collaborating with the police. However, whilst the vast majority of young people are positive about getting involved in policing, there are important variations within young people in their perceptions and attitudes towards the police. Young ethnic minorities in general, blacks in particular, were passive and reluctant to collaborate with the police due to their experiences of stop and search and other repercussion associated with the law enforcement style of policing. A lot of these problems can be subsided by diverting police resources to community policing, but there are going to be strong financial, organisational and cultural challenges

    Emergency preparedness: An analysis of Iowa high school emergency preparedness plans

    Get PDF
    The purpose of this research study was to examine whether high schools across Iowa were effectively prepared in the event of a natural or manmade disaster. Students learn more effectively when they feel safe. An electronic survey was sent to all accredited high school principals across Iowa in an effort to obtain data on their school\u27s emergency preparedness plans and to ascertain their attitudes on the importance of policies to deter violence. In addition to questions regarding development and completeness of plans, frequency of school incidents and perceived importance of policies, principals were asked to identify eight independent variables associated with demographics: (1) participant title; (2) gender; (3) years of experience; (4) Area Education Agency (AEA); (5) type of accredited school (public, charter, nonpublic, or other); (6) grade levels; (7) enrollment size of high school; and (8) urbanicity of school campus (rural, town, urban fringe of a large city, or city). Nearly all of the 72 Iowa high school principals who participated in the survey have an emergency preparedness plan in place, and approximately 75% of these Iowa high schools have two or more copies of their emergency preparedness plan placed throughout their school. Approximately 75% of the Iowa\u27s high school principals participating in the survey have had at least one practice drill at their school during the last five years, and nearly 42% of these principals believe their high school is at risk for an act of terrorism. Overall results showed urban fringe and city high schools participating in the survey had more safety and security measures in place in their high schools. It is recommended that further studies be conducted to analyze high school emergency preparedness include middle school as well as high school principals to broaden the researcher\u27s survey base and strengthen statistical reliability. It is also recommended the Principal Questionnaire School Survey on Crime and Safety (SSOCS), a national survey sent out by the U. S. Department of Education, be utilized to compare national statistics on middle and high school principal safety measures and procedures to state and local statistics

    Congestion Pricing: A Parking Queue Model

    Get PDF
    Congestion pricing imposes a usage fee on a public resource during times of high demand. Road pricing involves cordoning off a section of the city and imposing a fee on vehicles that enter it. Parking pricing increases the costs of on-street and perhaps off-street parking. Following an historical review, we develop a new queueing model of the parking pricing problem, recognizing that many urban drivers are simply looking for available on-street parking. Often, reducing the number of such “cruising drivers” would reduce urban road congestion dramatically, perhaps as effectively as cordoning off the center city
    • …
    corecore