146 research outputs found

    Cognitive strategies for security in wireless sensor networks

    Full text link
    Las redes de sensores inalámbricas son uno de los sectores con más crecimiento dentro de las redes inalámbricas. La rápida adopción de estas redes como solución para muchas nuevas aplicaciones ha llevado a un creciente tráfico en el espectro radioeléctrico. Debido a que las redes inalámbricas de sensores operan en las bandas libres Industrial, Scientific and Medical (ISM) se ha producido una saturación del espectro que en pocos años no permitirá un buen funcionamiento. Con el objetivo de solucionar este tipo de problemas ha aparecido el paradigma de Radio Cognitiva (CR). La introducción de las capacidades cognitivas en las redes inalámbricas de sensores permite utilizar estas redes para aplicaciones con unos requisitos más estrictos respecto a fiabilidad, cobertura o calidad de servicio. Estas redes que aúnan todas estas características son llamadas redes de sensores inalámbricas cognitivas (CWSNs). La mejora en prestaciones de las CWSNs permite su utilización en aplicaciones críticas donde antes no podían ser utilizadas como monitorización de estructuras, de servicios médicos, en entornos militares o de vigilancia. Sin embargo, estas aplicaciones también requieren de otras características que la radio cognitiva no nos ofrece directamente como, por ejemplo, la seguridad. La seguridad en CWSNs es un aspecto poco desarrollado al ser una característica no esencial para su funcionamiento, como pueden serlo el sensado del espectro o la colaboración. Sin embargo, su estudio y mejora es esencial de cara al crecimiento de las CWSNs. Por tanto, esta tesis tiene como objetivo implementar contramedidas usando las nuevas capacidades cognitivas, especialmente en la capa física, teniendo en cuenta las limitaciones con las que cuentan las WSNs. En el ciclo de trabajo de esta tesis se han desarrollado dos estrategias de seguridad contra ataques de especial importancia en redes cognitivas: el ataque de simulación de usuario primario (PUE) y el ataque contra la privacidad eavesdropping. Para mitigar el ataque PUE se ha desarrollado una contramedida basada en la detección de anomalías. Se han implementado dos algoritmos diferentes para detectar este ataque: el algoritmo de Cumulative Sum y el algoritmo de Data Clustering. Una vez comprobado su validez se han comparado entre sí y se han investigado los efectos que pueden afectar al funcionamiento de los mismos. Para combatir el ataque de eavesdropping se ha desarrollado una contramedida basada en la inyección de ruido artificial de manera que el atacante no distinga las señales con información del ruido sin verse afectada la comunicación que nos interesa. También se ha estudiado el impacto que tiene esta contramedida en los recursos de la red. Como resultado paralelo se ha desarrollado un marco de pruebas para CWSNs que consta de un simulador y de una red de nodos cognitivos reales. Estas herramientas han sido esenciales para la implementación y extracción de resultados de la tesis. ABSTRACT Wireless Sensor Networks (WSNs) are one of the fastest growing sectors in wireless networks. The fast introduction of these networks as a solution in many new applications has increased the traffic in the radio spectrum. Due to the operation of WSNs in the free industrial, scientific, and medical (ISM) bands, saturation has ocurred in these frequencies that will make the same operation methods impossible in the future. Cognitive radio (CR) has appeared as a solution for this problem. The networks that join all the mentioned features together are called cognitive wireless sensor networks (CWSNs). The adoption of cognitive features in WSNs allows the use of these networks in applications with higher reliability, coverage, or quality of service requirements. The improvement of the performance of CWSNs allows their use in critical applications where they could not be used before such as structural monitoring, medical care, military scenarios, or security monitoring systems. Nevertheless, these applications also need other features that cognitive radio does not add directly, such as security. The security in CWSNs has not yet been explored fully because it is not necessary field for the main performance of these networks. Instead, other fields like spectrum sensing or collaboration have been explored deeply. However, the study of security in CWSNs is essential for their growth. Therefore, the main objective of this thesis is to study the impact of some cognitive radio attacks in CWSNs and to implement countermeasures using new cognitive capabilities, especially in the physical layer and considering the limitations of WSNs. Inside the work cycle of this thesis, security strategies against two important kinds of attacks in cognitive networks have been developed. These attacks are the primary user emulator (PUE) attack and the eavesdropping attack. A countermeasure against the PUE attack based on anomaly detection has been developed. Two different algorithms have been implemented: the cumulative sum algorithm and the data clustering algorithm. After the verification of these solutions, they have been compared and the side effects that can disturb their performance have been analyzed. The developed approach against the eavesdropping attack is based on the generation of artificial noise to conceal information messages. The impact of this countermeasure on network resources has also been studied. As a parallel result, a new framework for CWSNs has been developed. This includes a simulator and a real network with cognitive nodes. This framework has been crucial for the implementation and extraction of the results presented in this thesis

    Ab initio HF and DFT calculation of the second order NLO response of tetrathiafulvalene and 1,3‐dithiole derivatives

    Get PDF
    Trabajo presentado a la "International Conference of Computational Methods in Sciences and Engineering (ICCMSE)" celebrada del 25 al 30 de Septiembre en Grecia.-- Publicado en: AIP Conf. Proc. 963, pp. 326-329; doi:http://dx.doi.org/10.1063/1.2836075The nonlinear optical properties of new tetrathiafulvalenes and 1,3-dithioles have been studied using first principle methods. The higher hyperpolarizabilities of the extended 1,3-dithioles compared to Tetrathiafulvalene analogs are explained on the basis of the less localized HOMO of the former giving rise to higher transition dipole moments and a more pronounced decrease of the HOMO-LUMO gap on chain extension.Financial support from MEC-FEDER (CTQ2005-01368) and Gobierno de Aragón-Fondo Social europeo (E-39) is acknowledged.Peer reviewe

    Pasión de muerte y primavera: una lectura de la obra de Miguel Labordeta

    Get PDF
    En la tesina se propone una lectura de la obra de Miguel Labordeta bajo un enfoque psicoanalítico. Centrándonos especialmente en su pasión por la vida y la muerte (en el poeta encontramos una marcada atracción por el suicidio), hemos intentado apoyarnos en algunos conceptos freudianos que puedan explicar la aparición conjunta de ambas pasiones, en principio irreconciliables; así como hemos tratado de descomponer los diferentes elementos del mundo y la retórica que Miguel Labordeta usó para su expresión

    PUE attack detection in CWSNs using anomaly detection techniques

    Get PDF
    Cognitive wireless sensor network (CWSN) is a new paradigm, integrating cognitive features in traditional wireless sensor networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in cognitive wireless sensor networks is an important problem since these kinds of networks manage critical applications and data. The specific constraints of WSN make the problem even more critical, and effective solutions have not yet been implemented. Primary user emulation (PUE) attack is the most studied specific attack deriving from new cognitive features. This work discusses a new approach, based on anomaly behavior detection and collaboration, to detect the primary user emulation attack in CWSN scenarios. Two non-parametric algorithms, suitable for low-resource networks like CWSNs, have been used in this work: the cumulative sum and data clustering algorithms. The comparison is based on some characteristics such as detection delay, learning time, scalability, resources, and scenario dependency. The algorithms have been tested using a cognitive simulator that provides important results in this area. Both algorithms have shown to be valid in order to detect PUE attacks, reaching a detection rate of 99% and less than 1% of false positives using collaboration

    Controlling the degradation of wireless sensor networks

    Get PDF
    With the fast expansion of Wireless Sensor Networks (WSNs) and the increasing emergence of new scenarios and applications, extending their lifetime is crucial. Usually, WSN developers use generic algorithms and deployment arrangements without considering the specific needs of their network's application. Taking this application into account can result in a significant enhancement of performance, both in terms of increasing the lifetime and improving the quality of service (QoS). Furthermore, most WSN developers do not consider the final behavior of the network when nodes are nearly depleted and resources are scarce. In this paper we introduce the concept of the controlled degradation of the network, to refer to the strategies aimed at managing this deterioration process. The existing definitions of the network lifetime do not normally consider the specific purpose or application for which the WSN is intended. Thus, they are not suited to describe and test controlled degradation strategies. Consequently, we propose a new formal and comprehensive definition for the network lifetime. Finally, this work presents a proof of concept that confirms our statements and reinforces the potential of this research line

    Evaluation, energy optimization, and spectrum analysis of an artificial noise technique to improve CWSN security

    Get PDF
    This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number of packets transmitted by the network and the active period of the nodes increase. Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. In this work, the scenario is formally modeled and the optimization according to the simulation results and the impact analysis over the frequency spectrum are presented

    PUE attack detection in CWSN using collaboration and learning behavior

    Get PDF
    Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of networks manage critical applications and data. Moreover, the specific constraints of WSN make the problem even more critical. However, effective solutions have not been implemented yet. Among the specific attacks derived from new cognitive features, the one most studied is the Primary User Emulation (PUE) attack. This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. A nonparametric CUSUM algorithm, suitable for low resource networks like CWSN, has been used in this work. The algorithm has been tested using a cognitive simulator that brings important results in this area. For example, the result shows that the number of collaborative nodes is the most important parameter in order to improve the PUE attack detection rates. If the 20% of the nodes collaborates, the PUE detection reaches the 98% with less than 1% of false positives

    A game theory based strategy for reducing energy consumption in cognitive WSN

    Get PDF
    Wireless sensor networks (WSNs) are one of the most important users of wireless communication technologies in the coming years and some challenges in this area must be addressed for their complete development. Energy consumption and spectrum availability are two of the most severe constraints of WSNs due to their intrinsic nature. The introduction of cognitive capabilities into these networks has arisen to face the issue of spectrum scarcity but could be used to face energy challenges too due to their new range of communication possibilities. In this paper a new strategy based on game theory for cognitive WSNs is discussed. The presented strategy improves energy consumption by taking advantage of the new change-communication-channel capability. Based on game theory, the strategy decides when to change the transmission channel depending on the behavior of the rest of the network nodes. The strategy presented is lightweight but still has higher energy saving rates as compared to noncognitive networks and even to other strategies based on scheduled spectrum sensing. Simulations are presented for several scenarios that demonstrate energy saving rates of around 65% as compared to WSNs without cognitive techniques

    Animal Models of Parkinson’s Disease

    Get PDF
    Parkinson\u27s disease (PD) is a neurodegenerative disorder characterized by the degeneration of dopaminergic neurons in the substantia nigra pars compacta, the consequent dopamine deficit in the striatum and the accumulation of aggregated α‐synuclein (α‐syn) in specific brain regions. The underlying pathophysiology of PD remains poorly understood. Animal models are the best tools to study the pathogenesis of PD. Most studies in PD animal models have focused on the motor features associated with dopamine depletion but still the molecular basis of PD and the molecular pathways of cell death remain unknown. While cellular models have helped to identify specific events, in vivo animal models have simulated most, although not all, of the hallmarks of PD and are useful for testing new neuroprotective approaches. In this chapter, we provide a summary of the most used PD animal models, including their advantages and limitations. Classically, in vivo PD animal models can be divided into those using environmental or synthetic neurotoxins (toxin‐based models) or those utilizing the in vivo expression of PD‐related mutations (genetic models). These models include 6‐hydroxydopamine (6‐OHDA), 1‐methyl‐1,2,3,6‐tetrahydropyridine (MPTP), rotenone, and paraquat, as well as genetic models such as those related to α‐syn, PINK1, Parkin, DJ‐1, and LRRK2

    Cognitive test-bed for wireless sensor networks

    Full text link
    Cognitive Wireless Sensor Networks are an emerging technology with a vast potential to avoid traditional wireless problems such as reliability, interferences and spectrum scarcity in Wireless Sensor Networks. Cognitive Wireless Sensor Networks test-beds are an important tool for future developments, protocol strategy testing and algorithm optimization in real scenarios. A new cognitive test-bed for Cognitive Wireless Sensor Networks is presented in this paper. This work in progress includes both the design of a cognitive simulator for networks with a high number of nodes and the implementation of a new platform with three wireless interfaces and a cognitive software for extracting real data. Finally, as a future work, a remote programmable system and the planning for the physical deployment of the nodes at the university building is presented
    corecore