3 research outputs found

    SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN

    Get PDF
    AbstractSecuring surveillance wireless sensor networks (WSNs) in hostile environments such as borders, perimeters and battlefields during Base Station (BS) failure is challenging. Surveillance WSNs are highly vulnerable to BS failure. The attackers can render the network useless by only destroying the BS as the needed efforts to destroy the BS is much less than that is needed to destroy the network. This attack scenario will give the attackers the best chance to compromise many legitimate nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs. Despite the best electronic countermeasures, intrusion tolerance and anti-traffic analysis strategies to protect the BSs, an adversary still can destroy them. This paper proposes a novel security architecture called Surveillance Security (SurvSec) for reliable network recovery from single BS failure of surveillance WSN with single BS. SurvSec relies on a set of sensor nodes serve as Security Managers for management and storage of the security related data of all sensor nodes. SurvSec security architecture provides methodologies for choosing and changing the security managers of the surveillance WSN. SurvSec has three components: (1) Sensor nodes serve as Security Managers, (2) Data Storage System, (3) Data Recovery System. Furthermore, both the frame format of the stored data is carefully built and the security threats are encoded to allow minimum overheads for SurvSec security architecture. In this paper, we provide detailed specifications of SurvSec security architecture. We evaluate our designed security architecture for reliable network recovery from BS failure. Our evaluation shows that the proposed new security architecture can meet all the desired specifications and our analysis shows that the provided Security Managers are capable of network recovery from BS failure

    Design and implementation of BGP novel control mechanism (BGP-NCM) based on network performance parameters

    No full text
    Border Gateway Protocol (BGP) is the defecto standard routing protocol of the internet and has served as backbone technology for logical routing tasks to provide global connectivity in the world. Unfortunately, there are limitations on network performance factors such as latency or link utilization which are not used in BGP routing decisions. These limitations have a great effect on internet services, especially bandwidth sensitive application, where BGP does not automatically redistribute the traffic over different Multihomed links based on link utilization or latency. In this paper, a novel control mechanism for BGP (BGP-NCM) is proposed. BGP-NCM is a software controller which has been developed and injected in the Enterprise or internet service provider BGP multihomed network to force the traffic redistribution over the available links based on the link utilization or latency. The BGP-NCM has been developed using Python programming language and it consists of three modules which are Monitoring, Traffic Calculation and Configuration modules. BGP-NCM will keep an eye on link utilization by checking the monitoring tool log and when the link utilization reaches a predefined value, the BGP-NCM traffic calculation module will be triggered to determine the amount of traffic and corresponding IP prefix as well as the target link with available bandwidth to accommodate the redistributed traffic. Our results show that BGP-NCM solves the traffic redistribution problem without any change in both BGP protocol and running internet infrastructure. Keywords: Bandwidth, BGP, BGP-NCM, Utilization, Multihomed, Python, Quagga, SLA, SNM

    Clinical and genetic characterization of ten Egyptian patients with Wolf–Hirschhorn syndrome and review of literature

    No full text
    Abstract Background Wolf–Hirschhorn syndrome (WHS) (OMIM 194190) is a multiple congenital anomalies/intellectual disability syndrome. It is caused by partial loss of genetic material from the distal portion of the short arm of chromosome. Methods We studied the phenotype–genotype correlation. Results We present the clinical manifestations and cytogenetic results of 10 unrelated Egyptian patients with 4p deletions. Karyotyping, FISH and MLPA was performed for screening for microdeletion syndromes. Array CGH was done for two patients. All patients exhibited the cardinal clinical manifestation of WHS. FISH proved deletion of the specific WHS locus in all patients. MLPA detected microdeletion of the specific locus in two patients with normal karyotypes, while array CGH, performed for two patients, has delineated the extent of the deleted segments and the involved genes. LETM1, the main candidate gene for the seizure phenotype, was found deleted in the two patients tested by array CGH; nevertheless, one of them did not manifest seizures. The study emphasized the previous. Conclusion WHS is a contiguous gene syndrome resulting from hemizygosity of the terminal 2 Mb of 4p16.3 region. The Branchial fistula, detected in one of our patients is a new finding that, to our knowledge, was not reported
    corecore