217 research outputs found
Zigbee Based Home Automation and Agricultural Monitoring System A mesh networking approach for autonomous and manual system control
Today’s generation of electronic devices are more enhanced and capable than the previous ones with exciting changes in technology has seen to control a variety of home devices with the help of a home automation system. These devices can include lights, fans, doors, surveillance systems and consumer electronics. However along with the smartness and intuitiveness we want a system which is economic as well as low power consuming. ZigBee technology collects and monitors different types of measurements that reflect energy consumption and environment parameters. This paper details the designing of a protocol to monitor various environmental conditions in a home. We are using advanced technology of Micaz motes (which have their own routing capabilities), NESC language programming and Moteworks (used as a data acquisition platform)
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication
The visualization of future generation Wireless Communication Network WCN
redirects the presumption of onward innovations, the fulfillment of user
demands in the form of high data rates, energy efficiency, low latency, and
long-range services. To content these demands, various technologies such as
massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum
sharing, D2D Device to Device communication were improvised in the next
generation WCN. In comparison to previous technologies, these technologies
exhibit flat architecture, the involvement of clouds in the network,
centralized architecture incorporating small cells which creates vulnerable
breaches initiating menaces to the security of the network. The half-duplex
attack is another threat to the WCN, where the resource spoofing mechanism is
attained in the downlink phase of D2D communication. Instead of triggering an
attack on both uplink and downlink, solely downlink is targeted by the
attacker. This scheme allows the reduced failed attempt rate of the attacker as
compared to the conventional attacks. The analysis is determined on the basis
of Poissons distribution to determine the probability of failed attempts of
half duplex attack in contrast to a full duplex attac
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
This paper introduces a systematic and novel mechanism for devising a
security attack in the WCN (Wireless Communication Network). The proposed model
involves the implementation of the AD (Artificial Dust) by the intruder,
followed by the execution of the HD (Half-Duplex) attack. The communication
network is based on the deployment of urban and rural scenarios with an unknown
CSI (Channel State Information). Depending on the achieved path loss based on
the distance of the user from the BS, the user with the highest path loss is
particularized for the attack. The formulation of AD divulges the increased
susceptibilities of the secure network specifically for the selected legitimate
user. The parameter of visibility defines the amount of AD present in the
communication channel. Based on the enumerated attenuation created by the
artificial dust, the parameter of secrecy rate is evaluated with varying
distance of the user from the BS and the operating frequency. Furthermore, the
proposed scheme of the HD attack is initiated by the intruder at the specified
valid user. The strategy of the attack focuses on the continuous monitor of the
uplink and attempts the spoofing attack on the downlink wherein the allocation
of the resources takes place. The efficacy of the proposed approach is
corroborated through the examination of simulation results. The assessment of
the proposed mechanism highlights notable characteristics as compared to the
conventional methodology of the FD (Full- Duplex) attack
The evaluation of the incidence of sensorineural component of hearing loss in chronic suppurative otitis media
Background: The sensorineural component of hearing loss either in form of pure sensorineural or Mixed components has since long been suspected to be a dreaded sequela of chronic suppurative otitis media (CSOM). The aim of this study is to access the incidence of sensorineural hearing loss (SNHL) or mixed hearing loss (MHL) amongst people suffering from both mucosal and squamosal variants of CSOM.Methods: A prospective observational cohort study (control group: contralateral ear) was conducted at the E.N.T. department of tertiary care center from December 2020 to September 2022. 149 patients of ages 15-50 of either gender with unilateral CSOM were included in the study. The other normal ear of the same patient was taken as the control ear. The pure tone audiometry of both diseased and control ears at frequencies 500,1000,2000 and 4000 kHz were taken to determine SNHL or MHL.Results: The mean age was 26.54±8.75 years of which, 79 males and 70 females. The mean duration of disease was 3.92±3.32. SNHL occurred in 25.5% of cases, while conductive and MHL affected 69.8% and 4.7 % of patients respectively. Conclusions: SNHL and MHL occurred in a significant number of patients suffering from CSOM. Further research needs to be encouraged and management should be refined to decrease disease-related morbidity
Behavioral Model For Live Detection of Apps Based Attack
Smartphones with the platforms of applications are gaining extensive
attention and popularity. The enormous use of different applications has paved
the way to numerous security threats. The threats are in the form of attacks
such as permission control attacks, phishing attacks, spyware attacks, botnets,
malware attacks, privacy leakage attacks. Moreover, other vulnerabilities
include invalid authorization of apps, compromise on the confidentiality of
data, invalid access control. In this paper, an application-based attack
modeling and attack detection is proposed. Due to A novel attack vulnerability
is identified based on the app execution on the smartphone. The attack modeling
involves an end-user vulnerable application to initiate an attack. The
vulnerable application is installed at the background end on the smartphone
with hidden visibility from the end-user. Thereby, accessing the confidential
information. The detection model involves the proposed technique of an
Application-based Behavioral Model Analysis (ABMA) scheme to address the attack
model. The model incorporates application-based comparative parameter analysis
to perform the process of intrusion detection. The ABMA is estimated by using
the parameters of power, battery level, and the data usage. Based on the source
internet accessibility, the analysis is performed using three different
configurations as, WiFi, mobile data, and the combination of the two. The
simulation results verify and demonstrates the effectiveness of the proposed
model
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
The advancement in wireless communication technologies is becoming more
demanding and pervasive. One of the fundamental parameters that limit the
efficiency of the network are the security challenges. The communication
network is vulnerable to security attacks such as spoofing attacks and signal
strength attacks. Intrusion detection signifies a central approach to ensuring
the security of the communication network. In this paper, an Intrusion
Detection System based on the framework of graph theory is proposed. A
Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is
designed to detect the attacked node. The algorithm performs the layer-wise
analysis to extract the vulnerable nodes and ultimately the attacked node(s).
For each layer, every node is scanned for the possibility of susceptible
node(s). The strategy of the IDS is based on the analysis of energy efficiency
and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond
the range of upper and lower thresholds are detected as the nodes under attack.
Further, detected node(s) are transmitted with a random sequence of bits
followed by the process of re-authentication. The obtained results validate the
better performance, low time computations, and low complexity. Finally, the
proposed approach is compared with the conventional solution of intrusion
detection.Comment: in IEEE Transactions on Network and Service Management, 202
- …