17 research outputs found

    Psychophysical Responses Comparison in Spatial Visual, Audiovisual, and Auditory BCI-Spelling Paradigms

    Full text link
    The paper presents a pilot study conducted with spatial visual, audiovisual and auditory brain-computer-interface (BCI) based speller paradigms. The psychophysical experiments are conducted with healthy subjects in order to evaluate a difficulty and a possible response accuracy variability. We also present preliminary EEG results in offline BCI mode. The obtained results validate a thesis, that spatial auditory only paradigm performs as good as the traditional visual and audiovisual speller BCI tasks.Comment: The 6th International Conference on Soft Computing and Intelligent Systems and The 13th International Symposium on Advanced Intelligent Systems, 201

    A Transport Layer Mobility Support Mechanism

    Full text link
    Abstract. Recently, mobile SCTP (mSCTP) has been proposed as a transport layer approach for supporting mobility. mSCTP is based on the ’multi-homing ’ feature of Stream Control Transmission Proto-col (SCTP), and utilize the functions to dynamically add or delete IP addresses of end points to or from the existing connection in order to support mobility. In this paper, we propose a mechanism to determine when to add or delete an IP address, utilizing the link layer radio signal strength information in order to enhance the performance of mSCTP. We also propose a mechanism for a mobile node to initiate the change of data delivery path based on link layer radio signal strength information. The simulation results show that the performance of proposed transport layer mobility support mechanism is competitive compared to the tradi-tional network layer mobility supporting approach. Especially, when the moving speed of mobile node is fast, it shows better performance than the traditional network layer approach.

    Trust-Threshold Based Routing in Delay Tolerant Networks

    No full text
    Part 3: Short PapersInternational audienceWe propose a trust-threshold based routing protocol for delay tolerant networks, leveraging two trust thresholds for accepting recommendations and for selecting the next message carrier for message forwarding. We show that there exist optimal trust threshold values under which trust-threshold based routing performs the best in terms of message delivery ratio, message delay and message overhead. By means of a probability model, we perform a comparative analysis of trust-threshold based routing against epidemic, social-trust-based and QoS-trust-based routing. Our results demonstrate that trust-threshold based routing operating under proper trust thresholds can effectively trade off message delay and message overhead for a significant gain in message delivery ratio. Moreover, our analysis helps identify the optimal weight setting to best balance the effect of social vs. QoS trust metrics to maximize the message delivery ratio without compromising message delay and/or message overhead requirements

    Trust-Based Intrusion Detection in Wireless Sensor Networks

    No full text
    Abstract—We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, as well as a statistical method for calculating the false alarm probability. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Our results show that there exists an optimal trust threshold for minimizing false positives and false negatives. Further, the optimal trust threshold differs depending on the anticipated wireless sensor network lifetime. Index Terms—Trust management, intrusion detection, wireless sensor networks, security, false positives, false negatives. I
    corecore