226 research outputs found

    Distributed and Load-Adaptive Self Configuration in Sensor Networks

    Get PDF
    Proactive self-configuration is crucial for MANETs such as sensor networks, as these are often deployed in hostile environments and are ad hoc in nature. The dynamic architecture of the network is monitored by exchanging so-called Network State Beacons (NSBs) between key network nodes. The Beacon Exchange rate and the network state define both the time and nature of a proactive action to combat network performance degradation at a time of crisis. It is thus essential to optimize these parameters for the dynamic load profile of the network. This paper presents a novel distributed adaptive optimization Beacon Exchange selection model which considers distributed network load for energy efficient monitoring and proactive reconfiguration of the network. The results show an improvement of 70% in throughput, while maintaining a guaranteed quality-of- service for a small control-traffic overhead

    Cross-compiler bipartite vulnerability search

    Get PDF
    Open-source libraries are widely used in software development, and the functions from these libraries may contain security vulnerabilities that can provide gateways for attackers. This paper provides a function similarity technique to identify vulnerable functions in compiled programs and proposes a new technique called Cross-Compiler Bipartite Vulnerability Search (CCBVS). CCBVS uses a novel training process, and bipartite matching to filter SVM model false positives to improve the quality of similar function identification. This research uses debug symbols in programs compiled from open-source software products to generate the ground truth. This automatic extraction of ground truth allows experimentation with a wide range of programs. The results presented in the paper show that an SVM model trained on a wide variety of programs compiled for Windows and Linux, x86 and Intel 64 architectures can be used to predict function similarity and that the use of bipartite matching substantially improves the function similarity matching performance. Ā© 2021 by the authors. Licensee MDPI, Basel, Switzerland

    Optimising Network Control Traffic in Resource Constrained MANETS

    Get PDF
    The exchange of Network State Beacons (NSBs) is crucial to monitoring the dynamic state of MANETs like sensor networks. The rate of beacon exchange (FX) and the network state define both the time and nature of a proactive action to reconfigure the network in order to combat network performance degradation at a time of crisis. It is thus essential to select the FX within optimized bounds, so that minimal control traffic is incurred due to state maintenance and reconfiguration activities. This paper presents a novel distributed model that selects optimized bounds for FX selection and adapts dynamically to the load profile of the network for energy efficient monitoring and proactive reconfiguration

    Coverage Characteristics of Symmetric Topologies for Pervasive Sensor Networks

    Get PDF
    The success of pervasive computing environments comprising ubiquitous loco-dynamic sensing devices is very dependent upon the coverage characteristics (CCs) of the network topology. These characteristics include blanket coverage, network density, affects on surrounding environments and intra-sensor coverage overlaps. This paper presents a systematic mathematical model to quantitatively investigate the effects of CCs and provides a comparison with other well used topologies e.g. hexagonal, triangular and square grid. The paper uses connectivity, density saturation, conflict regions and effectiveness of the topology as quality parameters in simulation studies for a disaster recovery network in various irregular terrains. Numerical as well as simulation results confirm the improved performance of hexagonal topology (HT) in terms of the above mentioned quality parameters which can be used to tune the network design to ensure the required QoS throughout the life of the network

    Adaptive Self-Configuration for Distributed Load in Sensor Networks

    Get PDF
    The dynamic architecture of the network is monitored by exchanging so-called Network State Beacons (NSBs) between key network nodes. The Beacon Exchange rate and the network state define both the time and nature of a proactive action to combat network performance degradation at a time of crisis. It is thus essential to select and update the beacon exchange rate (FX) according to the variations in the load profile of the network. This paper presents a novel localized method that for selecting and updating the FX by adapting to the network load and energy constraints. The results indicating that the model reconfigures the network more effectively to achieve higher throughput as well as greater network integrity, with minimal resource overheads

    ā€œI am your perfect online partner" analysis of dating profiles used in cybercrime

    Get PDF
    Internet Online Dating has become an influential mainstream social practice facilitating the finding of a partner. Unscrupulous operators have identified its potential and started to use this platform for identity theft in form of so called Online Romance Scams. Quickly, this cybercrime has become very successful and thus, an increasing threat in the social networking environment. So far, very little is known about its structure and the reason for its success, and this needs to be known in order to be able to fight it efficiently. This research tries to contribute to this knowledge, and argues that scammers use so-called ā€˜Love Storiesā€™, which represent personal affinities related to romantic relationships, to their benefit when tailoring common narratives as part of fraudulent online profiles to attract their victims. We look at these different types of ā€˜Personal Love Storiesā€™ and discuss how they can be used in this type of scam, followed by a qualitative analysis of fraudulent profiles from three different international websites to examine this assumptio

    How to Improve Postgenomic Knowledge Discovery Using Imputation

    Get PDF
    While microarrays make it feasible to rapidly investigate many complex biological problems, their multistep fabrication has the proclivity for error at every stage. The standard tactic has been to either ignore or regard erroneous gene readings as missing values, though this assumption can exert a major influence upon postgenomic knowledge discovery methods like gene selection and gene regulatory network (GRN) reconstruction. This has been the catalyst for a raft of new flexible imputation algorithms including local least square impute and the recent heuristic collateral missing value imputation, which exploit the biological transactional behaviour of functionally correlated genes to afford accurate missing value estimation. This paper examines the influence of missing value imputation techniques upon postgenomic knowledge inference methods with results for various algorithms consistently corroborating that instead of ignoring missing values, recycling microarray data by flexible and robust imputation can provide substantial performance benefits for subsequent downstream procedures

    Combined SINR Based Vertical Handoff Algorithm for Next Generation Heterogeneous Wireless Networks

    Get PDF
    Next generation heterogeneous wireless networks offer the end users with assurance of QoS inside each access network as well as during vertical handoff between them. For guaranteed QoS, the vertical handoff algorithm must be QoS aware, which cannot be achieved with the use of traditional RSS as the vertical handoff criteria. In this paper, we propose a novel vertical handoff algorithm which uses received SINR from various access networks as the handoff criteria. This algorithm consider the combined effects of SINR from different access networks with SINR value from one network being converted to equivalent SINR value to the target network, so the handoff algorithm can have the knowledge of achievable bandwidths from both access networks to make handoff decisions with QoS consideration. Analytical results confirm that the new SINR based vertical handoff algorithm can consistently offer the end user with maximum available bandwidth during vertical handoff contrary to the RSS based vertical handoff, whose performance differs under different network conditions. System level simulations also reveal the improvement of overall system throughputs using SINR based vertical handoff, comparing with the RSS based vertical handoff
    • ā€¦
    corecore