5,443 research outputs found

    Sensor networks security based on sensitive robots agents. A conceptual model

    Full text link
    Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the current paper. The proposed technique could be used with machine learning based intrusion detection techniques. The new model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the intruders when securing a sensor network.Comment: 5 page

    Design and Implementation of Intelligent Guidance Algorithms for UAV Mission Protection

    Get PDF
    In recent years, the interest of investigating intelligent systems for Unmanned Aerial Vehicles (UAVs) have increased in popularity due to their large range of capabilities such as on-line obstacle avoidance, autonomy, search and rescue, fast prototyping and integration in the National Air Space (NAS). Many research efforts currently focus on system robustness against uncertainties but do not consider the probability of readjusting tasks based on the remaining resources to successfully complete the mission. In this thesis, an intelligent algorithm approach is proposed along with decision-making capabilities to enhance UAVs post-failure performance. This intelligent algorithm integrates a set of path planning algorithms, a health monitoring system and a power estimation approach. Post-fault conditions are considered as unknown uncertainties that unmanned vehicles could encounter during regular operation missions. In this thesis, three main threats are studied: the presence of unknown obstacles in the environment, sub-system failures, and low power resources. A solution for adapting to new circumstances is addressed by enabling autonomous decision-making and re-planning capabilities in real time

    Applications of Soft Computing in Mobile and Wireless Communications

    Get PDF
    Soft computing is a synergistic combination of artificial intelligence methodologies to model and solve real world problems that are either impossible or too difficult to model mathematically. Furthermore, the use of conventional modeling techniques demands rigor, precision and certainty, which carry computational cost. On the other hand, soft computing utilizes computation, reasoning and inference to reduce computational cost by exploiting tolerance for imprecision, uncertainty, partial truth and approximation. In addition to computational cost savings, soft computing is an excellent platform for autonomic computing, owing to its roots in artificial intelligence. Wireless communication networks are associated with much uncertainty and imprecision due to a number of stochastic processes such as escalating number of access points, constantly changing propagation channels, sudden variations in network load and random mobility of users. This reality has fuelled numerous applications of soft computing techniques in mobile and wireless communications. This paper reviews various applications of the core soft computing methodologies in mobile and wireless communications

    Predicting Network Attacks Using Ontology-Driven Inference

    Full text link
    Graph knowledge models and ontologies are very powerful modeling and re asoning tools. We propose an effective approach to model network attacks and attack prediction which plays important roles in security management. The goals of this study are: First we model network attacks, their prerequisites and consequences using knowledge representation methods in order to provide description logic reasoning and inference over attack domain concepts. And secondly, we propose an ontology-based system which predicts potential attacks using inference and observing information which provided by sensory inputs. We generate our ontology and evaluate corresponding methods using CAPEC, CWE, and CVE hierarchical datasets. Results from experiments show significant capability improvements comparing to traditional hierarchical and relational models. Proposed method also reduces false alarms and improves intrusion detection effectiveness.Comment: 9 page
    corecore