88 research outputs found

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    Full text link
    In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated under different traffic conditions and mobility patterns for the Black Hole, Forging, Packet Dropping, and Flooding attacks. The results indicate that Support Vector Machines exhibit high accuracy for almost all simulated attacks and that Packet Dropping is the hardest attack to detect.Comment: 12 pages, 7 figures, presented at MedHocNet 200

    Power Efficient Target Coverage in Wireless Sensor Networks

    Get PDF

    Exploring The Dynamics Of Change In European Municipal Settings: A Case Study Of Two Research And Development Projects

    Get PDF
    Transformational initiatives concerning electronic forms of governance occur increasingly often in our time. However most of them are characterised by lack of deeper understanding of the dynamics and possibilities of organizational and technological change in governmental settings. This paper endeavours an investigation of the undercurrent processes of organizational and technological change in the field of electronic governance. We base our research on the interpretive analysis of research data that were gathered through participant observation of two European research and development e-Government projects. In addition some more general implications are offered, based on our case studies, concerning the transformation of business processes, the changes in analysis, design and implementation of IS for e-Government, and electronic governance strategies. We believe that these implications can prove useful in both analyses and implementations of electronic governance

    Fast and reliable LoRa-based data transmissions

    Get PDF
    LoRaWAN is a recently proposed MAC layer protocol which manages communications between LoRa-based gate-ways and end-devices. It has attracted much scientific attention due its physical layer characteristics, but mainly due to its versatile configuration parameters. However, it is known that LoRaWAN-based transmissions suffer from extensive collisions due to the unregulated access to the medium. For this reason, various techniques that alleviate the burst of collisions have been proposed in the literature. In this paper, we deal with the problem of fast data delivery in LoRa-based networks. We model a network where transmissions follow a Poisson process. We compute the average packet success probability per Spreading Factor (SF) assuming orthogonal transmissions. We, then, formulate an SF optimization problem to maximize the success probability given an amount of data per node and a maximum data collection time window. We show - both theoretically and using simulations - that the overall success probability can be improved by approximately 100% using optimal SF assignments. We validate our findings using a 10-node testbed and extensive experiments. Despite that experiments reveal the existence of inter-SF interference, our solution still provides the best performance compared to other LoRaWAN configurations
    • …
    corecore