22 research outputs found

    Quarantine region scheme to mitigate spam attacks in wireless sensor networks

    Get PDF
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe

    A software prototype for a Command, Control, Communications and Intelligence (C_x001B_p3_x001B_sI) workstation

    Get PDF
    Developing large hard-real-time systems in a traditional way usually creates inconsistencies among the user's needs, the requirements and the implementation. Rapid Prototyping by using Prototype System Description Language (PSDL) and Computer Aided Prototyping System (CAPS) minimizes the time and resource costs, and maximizes reliability. In this technique, designer builds the prototype with the initial requirements, and the user evaluates the actual behavior of the prototype against its expected behavior. If prototype fails to execute properly, the user and the designer work together to change the requirements and the prototype, unit the prototype captures the critical aspects of the software system. This thesis uses the rapid prototyping approach to produce an Ada software prototype of C3I workstation, which provides commonality and connectivity between naval platforms and land bases by providing the ability to process tactical data from many interfaces in real-time. The major emphasis of the prototype is to support C3I information management functions, message generation and information display.Ltjg., Turkish NavyApproved for public release; distribution is unlimited

    Sensor wars: detecting and defending against spam attacks in tactical AdHoc sensor networks

    No full text
    Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network

    SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider

    No full text
    Mobile technology is so popular and overdosed adoption is inevitable in today's world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool

    A successfully treated case of necrotizing fasciitis with complicated sepsis due to intramuscular steroid injection

    No full text
    Necrotising fasciitis is a devastating soft tissue infection which characterised by rapidly progressing necrosis involving mainly fascia and subcutaneous tissues. A 66-year old male patient with chronic obstructive pulmonary disease admitted to our hospital with fever, pain and swelling in the right thigh and right leg, difficulty in walking, dry mouth and weakness. There was a single dose intramuscular steroid injection story in his anamnesis. Physical examination revealed swelling, hyperemia and pain in the right gluteal region spreading through the right femur and popliteal fossa. He was diagnosed necrotizing fasciitis complicated with sepsis. We administered the supportive therapy and broad-spectrum antibiotic therapy in addition to the surgical debridement, vacuum assisted closure and hyperbaric oxygen therapy. The patient was discharged after six months of the follow-up period in hospital. In conclusion, Health-care personnel should be careful when the intramuscular injections planned for patients at the risk of development of necrotizing fasciitis reason of their chronic illnesses or immunosuppressive conditions. In patients who developed necrotizing fasciitis despite everything, we want to strongly emphasise the advantageous hyperbaric oxygen therapy as an additional therapy to the broad spectrum antibiotherapy and surgical debridement [Cukurova Med J 2016; 41(4.000): 787-791
    corecore