71 research outputs found

    Securing Localization With Hidden and Mobile Base Stations

    Get PDF
    Abstract — Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed that aim to detect and prevent attacks on localization systems. In this work, we propose a new approach to secure localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure node-centric and infrastructurecentric localization schemes. We further show how this approach can be applied to secure localization in sensor networks. I

    Seasonal Changes in Chemical Profile and Antioxidant Activity of Padina pavonica Extracts and Their Application in the Development of Bioactive Chitosan/PLA Bilayer Film

    Get PDF
    Seaweeds are a potentially sustainable source of natural antioxidants that can be used in the food industry and possibly for the development of new sustainable packaging materials with the ability to extend the shelf-life of foods and reduce oxidation. With this in mind, the seasonal variations in the chemical composition and antioxidant activity of brown seaweed (Padina pavonica) extracts were investigated. The highest total phenolic content (TPC) and antioxidant activity (measured by ferric reducing/antioxidant power (FRAP), 2,2-diphenyl-1-picrylhydrazyl (DPPH) radical scavenging, and oxygen radical absorbance capacity (ORAC)) were found for P. pavonica June extract. The TPC of 26.69 1.86 mg gallic acid equivalent/g, FRAP of 352.82 15.41 mole Trolox equivalent (TE)/L, DPPH of 52.51 2.81% inhibition, and ORAC of 76.45 1.47 mole TE/L were detected. Therefore, this extract was chosen for the development of bioactive PLA bilayer film, along with chitosan. Primary or quaternary chitosan was used as the first layer on polylactic acid (PLA) films. A suspension of chitosan particles with entrapped P. pavonica extract was used as the second layer. X-ray photoelectron spectroscopy confirmed the presence of layers on the material surface. The highest recorded antioxidant activity of the newly developed films was 63.82% inhibition. The developed functional films exhibited antifogging and antioxidant properties, showing the potential for application in the food industry.PRIMA program under project BioProMedFood 1467European Commissio

    Cloud-inclusive Aerial Imagery based on Commercial Flights as Remote Sensing Platform

    Get PDF
    Earth observation (EO) significantly increased in the second half of the 20th century and continues to advance rapidly, with remote sensing being a key component for gathering Earth-related information. Nowadays, satellites, manned aircraft, helicopters, UAVs and drones are used to capture aerial imagery in a periodic or schedule-based manner. This paper examine the feasibility of creating a novel remote sensing system by mounting cameras on commercial flights. The study evaluates flight coverage, including spatial and temporal resolutions, and considers the impact of clouds on image usability. We have compared flight coverage with cloud-inclusive flight coverage, which represents reduced flight coverage based on cloud quantity. Results show that entire country of Croatia is covered between 95% and 100% during the day and night. However, when clouds are included in the calculation, it is important to consider different altitudes and periods of the year because their distribution is not the same. In a less cloudy month (August), the highest differences between flight coverage and cloud-inclusive flight coverage for high-altitude flights are 70% for the worst-case scenario and 25% for the best-case scenario. Results show it is feasible to use commercial flights as a new remote sensing system

    On Selfish Behavior in CSMA/CA Networks

    Get PDF
    CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. This can be dangerous, since the nodes themselves control their random deferment. Indeed, with the higher programmability of the network adapters, the temptation to tamper with the software or firmware is likely to grow; by doing so, a user could obtain a much larger share of the available bandwidth at the expense of other users. We use a game-theoretic approach to investigate the problem of the selfish behavior of nodes in CSMA/CA networks, specifically geared towards the most widely accepted protocol in this class of protocols, IEEE~802.11. We characterize two families of Nash equilibria in a single stage game, one of which always results in a network collapse. We argue that this result provides an incentive for cheaters to cooperate with each other. Explicit cooperation among nodes is clearly impractical. By applying the model of dynamic games borrowed from game theory, we derive the conditions for the stable and optimal functioning of a population of cheaters. We use this insight to develop a simple, localized and distributed protocol that successfully guides multiple selfish nodes to a Pareto-optimal Nash equilibrium

    Maximizing the antioxidant capacity of Padina pavonica by choosing the right drying and extraction methods

    Get PDF
    Marine algae are becoming an interesting source of biologically active compounds with a promising application as nutraceuticals, functional food ingredients, and therapeutic agents. The effect of drying (freeze-drying, oven-drying, and shade-drying) and extraction methods (shaking at room temperature, shaking in an incubator at 60 \ub0C, ultrasound-assisted extraction (UAE), and microwave-assisted extraction (MAE)) on the total phenolics content (TPC), total flavonoids content (TFC), and total tannins content (TTC), as well as antioxidant capacity of the water/ethanol extracts from Padina pavonica were investigated. The TPC, TFC, and TTC values of P. pavonica were in the range from 0.44 \ub1 0.03 to 4.32 \ub1 0.15 gallic acid equivalents in mg/g (mg GAE/g) dry algae, from 0.31 \ub1 0.01 to 2.87 \ub1 0.01 mg QE/g dry algae, and from 0.32 \ub1 0.02 to 10.41 \ub1 0.62 mg CE/g dry algae, respectively. The highest TPC was found in the freeze-dried sample in 50% ethanol, extracted by MAE (200 W, 60 \ub0C, and 5 min). In all cases, freeze-dried samples extracted with ethanol (both 50% and 70%) had the higher antioxidant activity, while MAE as a green option reduces the extraction time without the loss of antioxidant activity in P. pavonica

    Minimum-energy broadcast in all-wireless networks: NP-Completeness and distribution issues

    Get PDF
    In all-wireless networks a crucial problem is to minimize energy consumption, as in most cases the nodes are battery-operated. We focus on the problem of power-optimal broadcast, for which it is well known that the broadcast nature of the radio transmission can be exploited to optimize energy consumption. Several authors have conjectured that the problem of power-optimal broadcast is NP-complete. We provide here a formal proof, both for the general case and for the geometric one; in the former case, the network topology is represented by a generic graph with arbitrary weights, whereas in the latter a Euclidean distance is considered. We then describe a new heuristic, Embedding Wireless Multicast Advantage. We show that it compares well with other proposals and we explain how it can be distributed

    Efficient MAC in cognitive radio systems: A game-theoretic approach

    Get PDF
    In this paper, we study the problem of efficient medium access control (MAC) among cognitive radio devices that are equipped with multiple radios and thus are capable of transmitting simultaneously at different frequencies (channels). We assume that radios contend on each channel using the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. We study two MAC problems: (i) the allocation of the available channels among radios, and (ii) the optimal usage of each allocated channel by the radios occupying it. Both problems are studied in a game-theoretic setting, where devices aim to selfishly maximize their share of the available bandwidth. As for the first problem, we show that the ”price of anarchy" is close to 1, that is, Nash equilibria imply nearly system optimal allocations of the available channels. For the second problem, we design a game such that it admits a unique Nash equilibrium that is is both fair and Pareto-optimal. Furthermore, we propose simple mechanisms that enable selfish cognitive radio devices not only to coordinate efficiently on the available channels but also to optimally use every single allocated channel

    Multi-radio Channel Allocation in Competitive Wireless Networks

    Get PDF
    Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio systems, bring this topic into the focus of research again. In this paper, we provide a formal analysis of the selfish multi-radio channel allocation problem using game theory. We conclude that in spite of the non-cooperative behavior of such devices, their channel allocation results in a Pareto- and system-optimal solution. Furthermore, we present a simple algorithm to achieve this efficient channel allocation. To the best of our knowledge, our paper is the first contribution to this important topic

    A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

    Get PDF
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a lowpower jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in realtime and alleviates their impact by allocating the available bandwidth in a fair and efficient way. © Springer Science+Business Media
    • 

    corecore