35 research outputs found
Recommended from our members
A probability based hybrid energy-efficient privacy preserving scheme to encounter with wireless traffic snooping in smart home
Application of pervasive computing devices in smart homes are rising sharply and due to this matter, demands for efficient privacy protection are increasing urgently. Possibility of interference in wireless networks is proved by previous work. Adversaries can discover contextual information because of traffic monitoring and classifying transmitters based on their radio fingerprints while data packets are encrypted or content is not important for attackers. To conceal communication patterns various approaches have been investigated. They are mainly based on injection of dummy packets into the network traffic and adding delay to transmission time. In this paper, we introduce a hybrid energy-efficient privacy preserving scheme for generating and sending dummy packets through a decision-making algorithm which works based on probability to maximize confusion of attacker in clarifying the real pattern of network traffi
Recommended from our members
Side channel attacks on smart home systems: A short overview
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in the smart home. Smart homes are enabled by the latest developments in sensors, communication technologies, internet protocols, and cloud services. The goal of a smart home is to have smart household devices collaborate without involvement of residents to deliver the variety of services needed for a higher quality of life. However, security and privacy challenges of smart homes have to be overcome in order to fully realize the smart home. Side channel attacks assume data is always leaking, and leakage of data from a smart home reveals sensitive information. This paper starts by reviewing side-channel attack categories, then it gives an overview on recent attack studies on different layers of a smart home and their malicious goals
Recommended from our members
Three-dimensional turbulent vortex shedding from a surface-mounted square cylinder: Predictions with large-eddy simulations and URANS
The paper reports on the prediction of the turbulent flow field around a three-dimensional, surface mounted, square-sectioned cylinder at Reynolds numbers in the range 104-105. The effects of turbulence are accounted for in two different ways: by performing large-eddy simulations (LES) with a Smagorinsky model for the subgrid-scale motions and by solving the unsteady form of the Reynolds-averaged Navier-Stokes equations (URANS) together with a turbulence model to determine the resulting Reynolds stresses. The turbulence model used is a two-equation, eddy-viscosity closure that incorporates a term designed to account for the interactions between the organized mean-flow periodicity and the random turbulent motions. Comparisons with experimental data show that the two approaches yield results that are generally comparable and in good accord with the experimental data. The main conclusion of this work is that the URANS approach, which is considerably less demanding in terms of computer resources than LES, can reliably be used for the prediction of unsteady separated flows provided that the effects of organized mean-flow unsteadiness on the turbulence are properly accounted for in the turbulence model. Copyright © 2014 by ASME
Three-dimensional turbulent vortex shedding from a surface-mounted square cylinder: Predictions with large-eddy simulations and URANS
The paper reports on the prediction of the turbulent flow field around a three-dimensional, surface mounted, square-sectioned cylinder at Reynolds numbers in the range 10 -10 . The effects of turbulence are accounted for in two different ways: by performing large-eddy simulations (LES) with a Smagorinsky model for the subgrid-scale motions and by solving the unsteady form of the Reynolds-averaged Navier-Stokes equations (URANS) together with a turbulence model to determine the resulting Reynolds stresses. The turbulence model used is a two-equation, eddy-viscosity closure that incorporates a term designed to account for the interactions between the organized mean-flow periodicity and the random turbulent motions. Comparisons with experimental data show that the two approaches yield results that are generally comparable and in good accord with the experimental data. The main conclusion of this work is that the URANS approach, which is considerably less demanding in terms of computer resources than LES, can reliably be used for the prediction of unsteady separated flows provided that the effects of organized mean-flow unsteadiness on the turbulence are properly accounted for in the turbulence model. Copyright © 2014 by ASME. 4
Large metropolitan water demand forecasting using DAN2, FTDNN, and KNN models: A case study of the city of Tehran, Iran
<p>Efficient operation of urban water systems necessitates accurate water demand forecasting. We present daily, weekly, and monthly water demand forecasting using dynamic artificial neural network (DAN2), focused time-delay neural network (FTDNN), and K-nearest neighbor (KNN) models for the city of Tehran. The daily model investigates whether partitioning weekdays into weekends and non-weekends can improve forecast results; it did not. The weekly model yielded good results by using the summation of the daily forecast values into their corresponding weeks. The monthly results showed that partitioning the year into high and low seasons can improve forecast accuracy. All three models offer very good results for water demand forecasting. DAN2, the best model, yielded forecasting accuracies of 96%, 99%, and 98%, for daily, weekly, and monthly models respectively.</p
Analysis of Practical Aspects of Multi-Plane Routing-Based Load Balancing Approach for Future Link-State Convergent All-IP Access Networks
With the expected surge in the global IP traffic, service providers would need to adapt accordingly to operate disruption and loss free networks supported with the developing IP infrastructure. With the disposal of the hierarchical network structure, radio access networks are moving towards a flat-IP architecture and novel topological set-ups in the backhaul. Hence, a routing paradigm that employs suitable Traffic Engineering (TE) techniques aligned with the developing nature of future access networks must be applied. It becomes imminent that the routing considerations for IP access networks converge with theones found in conventional intra-domain routing. In this paper, Multi-Plane Routing (MPR) that consolidates various aspects in all-IP infrastructure is extensively studied in access network structures. We propose a MPR-based TE approach considering two different scenarios to reflect the evolution in the architectural design of access network structures under a realistic traffic scenario with a varying range of internal/external traffic. Moreover, a new optimization framework for the offline and onlineTE mechanisms of MPR have been formulated. Accordingly, a practical performance evaluation testing the validity of the aforementioned scenarios is presented. Our simulation results demonstrate extensive analysis in terms of several performance criteria in networks. It is convincingly shown that for ranges of topologies, MPR's utilization of whole topology in building path diversity in networks, allows for significant improvement of networks capacity, performance and support for meshing
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack
Smart home technologies have attracted more users in recent years due to significant advancements in their underlying enabler components, such as sensors, actuators, and processors, which are spreading in various domains and have become more affordable. However, these IoT-based solutions are prone to data leakage; this privacy issue has motivated researchers to seek a secure solution to overcome this challenge. In this regard, wireless signal eavesdropping is one of the most severe threats that enables attackers to obtain residents’ sensitive information. Even if the system encrypts all communications, some cyber attacks can still steal information by interpreting the contextual data related to the transmitted signals. For example, a “fingerprint and timing-based snooping (FATS)” attack is a side-channel attack (SCA) developed to infer in-home activities passively from a remote location near the targeted house. An SCA is a sort of cyber attack that extracts valuable information from smart systems without accessing the content of data packets. This paper reviews the SCAs associated with cyber–physical systems, focusing on the proposed solutions to protect the privacy of smart homes against FATS attacks in detail. Moreover, this work clarifies shortcomings and future opportunities by analyzing the existing gaps in the reviewed methods