777 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions

    Full text link
    In recent decades, social network anonymization has become a crucial research field due to its pivotal role in preserving users' privacy. However, the high diversity of approaches introduced in relevant studies poses a challenge to gaining a profound understanding of the field. In response to this, the current study presents an exhaustive and well-structured bibliometric analysis of the social network anonymization field. To begin our research, related studies from the period of 2007-2022 were collected from the Scopus Database then pre-processed. Following this, the VOSviewer was used to visualize the network of authors' keywords. Subsequently, extensive statistical and network analyses were performed to identify the most prominent keywords and trending topics. Additionally, the application of co-word analysis through SciMAT and the Alluvial diagram allowed us to explore the themes of social network anonymization and scrutinize their evolution over time. These analyses culminated in an innovative taxonomy of the existing approaches and anticipation of potential trends in this domain. To the best of our knowledge, this is the first bibliometric analysis in the social network anonymization field, which offers a deeper understanding of the current state and an insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure

    Model-to-Model Transformations for RIA Architectures: a Systematic Mapping Study

    Get PDF
    This study focuses on model-to-model transformations, as part of the Model-Driven Development (MDD) approach, for Rich Internet Applications (RIA). The main aim of this study is to identify fields that require further contributions, and/or research opportunities in the previously mentioned context.CONACYT – Consejo Nacional de Ciencia y TecnologíaPROCIENCI

    Exploring Model-to-Model Transformations for RIA Architectures by means of a Systematic Mapping Study

    Get PDF
    This study focuses on model-to-model – M2M – transformations, as part of the Model-Driven Development – MDD – approach, for Rich Internet Applications – RIA. The main aim of this study is to identify fields that require further contributions, and/or research opportunities in the previously mentioned context.CONACYT – Consejo Nacional de Ciencia y TecnologíaPROCIENCI

    Exploring Model-to-Model Transformations for RIA Architectures by means of a Systematic Mapping Study

    Get PDF
    This study focuses on model-to-model – M2M – transformations, as part of the Model- Driven Development – MDD – approach, for Rich Internet Applications – RIA. The main aim of this study is to identify fields that require further contributions, and/or research opportunities in the previously mentioned context. We applied mapping studies techniques, since these techniques use the same basic methodology as reviews but are more general and aimed at discovering what the research trends are, allowing to identify gaps in the literature. From an initial set of 132 papers, we selected 30 papers first. Then, thanks to experts’ suggestion, we added 3 additional papers. Therefore, we considered 33 research papers. The performed analysis led to various considerations. Among the important ones, we can mention: there are many newly proposed methods, the scarcity of rigorous and formal validation of such methods, the problem of the portability of Platform Independent Models – PIM, and the low number of tools available for MDD.Laboratorio de Investigación y Formación en Informática Avanzad

    Airborne Wireless Sensor Networks for Airplane Monitoring System

    Get PDF
    In traditional airplane monitoring system (AMS), data sensed from strain, vibration, ultrasound of structures or temperature, and humidity in cabin environment are transmitted to central data repository via wires. However, drawbacks still exist in wired AMS such as expensive installation and maintenance, and complicated wired connections. In recent years, accumulating interest has been drawn to performing AMS via airborne wireless sensor network (AWSN) system with the advantages of flexibility, low cost, and easy deployment. In this review, we present an overview of AMS and AWSN and demonstrate the requirements of AWSN for AMS particularly. Furthermore, existing wireless hardware prototypes and network communication schemes of AWSN are investigated according to these requirements. This paper will improve the understanding of how the AWSN design under AMS acquires sensor data accurately and carries out network communication efficiently, providing insights into prognostics and health management (PHM) for AMS in future

    Exploring Model-to-Model Transformations for RIA Architectures by means of a Systematic Mapping Study

    Get PDF
    This study focuses on model-to-model – M2M – transformations, as part of the ModelDriven Development – MDD – approach, for Rich Internet Applications – RIA. The main aim of this study is to identify fields that require further contributions, and/or research opportunities in the previously mentioned context. We applied mapping studies techniques, since these techniques use the same basic methodology as reviews but are more general and aimed at discovering what the research trends are, allowing to identify gaps in the literature. From an initial set of 132 papers, we selected 30 papers first. Then, thanks to experts’ suggestion, we added 3 additional papers. Therefore, we considered 33 research papers. The performed analysis led to various considerations. Among the important ones, we can mention: there are many newly proposed methods, the scarcity of rigorous and formal validation of such methods, the problem of the portability of Platform Independent Models – PIM, and the low number of tools available for MDD

    Collaborative Indoor Positioning Systems: A Systematic Review

    Get PDF
    Research and development in Collaborative Indoor Positioning Systems (CIPSs) is growing steadily due to their potential to improve on the performance of their non-collaborative counterparts. In contrast to the outdoors scenario, where Global Navigation Satellite System is widely adopted, in (collaborative) indoor positioning systems a large variety of technologies, techniques, and methods is being used. Moreover, the diversity of evaluation procedures and scenarios hinders a direct comparison. This paper presents a systematic review that gives a general view of the current CIPSs. A total of 84 works, published between 2006 and 2020, have been identified. These articles were analyzed and classified according to the described system’s architecture, infrastructure, technologies, techniques, methods, and evaluation. The results indicate a growing interest in collaborative positioning, and the trend tend to be towards the use of distributed architectures and infrastructure-less systems. Moreover, the most used technologies to determine the collaborative positioning between users are wireless communication technologies (Wi-Fi, Ultra-WideBand, and Bluetooth). The predominant collaborative positioning techniques are Received Signal Strength Indication, Fingerprinting, and Time of Arrival/Flight, and the collaborative methods are particle filters, Belief Propagation, Extended Kalman Filter, and Least Squares. Simulations are used as the main evaluation procedure. On the basis of the analysis and results, several promising future research avenues and gaps in research were identified
    • …
    corecore