591 research outputs found

    Bluetooth-base Worm Modeling And Simulation

    Get PDF
    Bluetooth is one of the most popular technologies in the world in the new century. Meanwhile it attracts attackers to develop new worm and malicious code attacking Bluetooth wireless network. So far the growth of mobile malicious code is very fast and they have become a great potential threat to our society. In this thesis, we study Bluetooth worm in Mobile Wireless Network. Firstly we investigate the Bluetooth technology and several previously appeared Bluetooth worms, e.g. Caribe , Comwar , and we find the infection cycle of a Bluetooth worm. Next, we develop a new simulator, Bluetooth Worm simulator (BTWS), which simulates Bluetooth worm\u27 behaviors in Mobile wireless networks. Through analyzing the result, we find i) In ideal environment the mobility of Bluetooth device can improve the worm\u27s propagation speed, but combining mobility and inquiry time issue would cause a Bluetooth worm to slow down its propagation under certain situation. ii) The number of initially infected Bluetooth devices mostly affects the beginning propagation speed of a worm, and energy issue can be ignored because the new technology can let Bluetooth device keeping work for a long time. iii) Co-channel interference and setting up monitoring system in public place can improve the security of Bluetooth wireless network

    Amplify-and-Forward Relaying in Two-Hop Diffusion-Based Molecular Communication Networks

    Full text link
    This paper studies a three-node network in which an intermediate nano-transceiver, acting as a relay, is placed between a nano-transmitter and a nano-receiver to improve the range of diffusion-based molecular communication. Motivated by the relaying protocols used in traditional wireless communication systems, we study amplify-and-forward (AF) relaying with fixed and variable amplification factor for use in molecular communication systems. To this end, we derive a closed-form expression for the expected end-to-end error probability. Furthermore, we derive a closed-form expression for the optimal amplification factor at the relay node for minimization of an approximation of the expected error probability of the network. Our analytical and simulation results show the potential of AF relaying to improve the overall performance of nano-networks.Comment: 7 pages, 6 figures, 1 table. Submitted to the 2015 IEEE Global Communications Conference (GLOBECOM) on April 15, 201

    Towards Opportunistic Data Dissemination in Mobile Phone Sensor Networks

    Get PDF
    Recently, there has been a growing interest within the research community in developing opportunistic routing protocols. Many schemes have been proposed; however, they differ greatly in assumptions and in type of network for which they are evaluated. As a result, researchers have an ambiguous understanding of how these schemes compare against each other in their specific applications. To investigate the performance of existing opportunistic routing algorithms in realistic scenarios, we propose a heterogeneous architecture including fixed infrastructure, mobile infrastructure, and mobile nodes. The proposed architecture focuses on how to utilize the available, low cost short-range radios of mobile phones for data gathering and dissemination. We also propose a new realistic mobility model and metrics. Existing opportunistic routing protocols are simulated and evaluated with the proposed heterogeneous architecture, mobility models, and transmission interfaces. Results show that some protocols suffer long time-to-live (TTL), while others suffer short TTL. We show that heterogeneous sensor network architectures need heterogeneous routing algorithms, such as a combination of Epidemic and Spray and Wait

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    A comprehensive survey on hybrid communication in context of molecular communication and terahertz communication for body-centric nanonetworks

    Get PDF
    With the huge advancement of nanotechnology over the past years, the devices are shrinking into micro-scale, even nano-scale. Additionally, the Internet of nano-things (IoNTs) are generally regarded as the ultimate formation of the current sensor networks and the development of nanonetworks would be of great help to its fulfilment, which would be ubiquitous with numerous applications in all domains of life. However, the communication between the devices in such nanonetworks is still an open problem. Body-centric nanonetworks are believed to play an essential role in the practical application of IoNTs. BCNNs are also considered as domain specific like wireless sensor networks and always deployed on purpose to support a particular application. In these networks, electromagnetic and molecular communications are widely considered as two main promising paradigms and both follow their own development process. In this survey, the recent developments of these two paradigms are first illustrated in the aspects of applications, network structures, modulation techniques, coding techniques and security to then investigate the potential of hybrid communication paradigms. Meanwhile, the enabling technologies have been presented to apprehend the state-of-art with the discussion on the possibility of the hybrid technologies. Additionally, the inter-connectivity of electromagnetic and molecular body-centric nanonetworks is discussed. Afterwards, the related security issues of the proposed networks are discussed. Finally, the challenges and open research directions are presented
    corecore