190 research outputs found

    Zigbee Based Home Automation and Agricultural Monitoring System A mesh networking approach for autonomous and manual system control

    Get PDF
    Today’s generation of electronic devices are more enhanced and capable than the previous ones with exciting changes in technology has seen to control a variety of home devices with the help of a home automation system. These devices can include lights, fans, doors, surveillance systems and consumer electronics. However along with the smartness and intuitiveness we want a system which is economic as well as low power consuming. ZigBee technology collects and monitors different types of measurements that reflect energy consumption and environment parameters. This paper details the designing of a protocol to monitor various environmental conditions in a home. We are using advanced technology of Micaz motes (which have their own routing capabilities), NESC language programming and Moteworks (used as a data acquisition platform)

    Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication

    Full text link
    The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to Device communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poissons distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attac

    Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN

    Full text link
    This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack

    The evaluation of the incidence of sensorineural component of hearing loss in chronic suppurative otitis media

    Get PDF
    Background: The sensorineural component of hearing loss either in form of pure sensorineural or Mixed components has since long been suspected to be a dreaded sequela of chronic suppurative otitis media (CSOM). The aim of this study is to access the incidence of sensorineural hearing loss (SNHL) or mixed hearing loss (MHL) amongst people suffering from both mucosal and squamosal variants of CSOM.Methods: A prospective observational cohort study (control group: contralateral ear) was conducted at the E.N.T. department of tertiary care center from December 2020 to September 2022. 149 patients of ages 15-50 of either gender with unilateral CSOM were included in the study. The other normal ear of the same patient was taken as the control ear. The pure tone audiometry of both diseased and control ears at frequencies 500,1000,2000 and 4000 kHz were taken to determine SNHL or MHL.Results: The mean age was 26.54±8.75 years of which, 79 males and 70 females. The mean duration of disease was 3.92±3.32. SNHL occurred in 25.5% of cases, while conductive and MHL affected 69.8% and 4.7 % of patients respectively. Conclusions: SNHL and MHL occurred in a significant number of patients suffering from CSOM. Further research needs to be encouraged and management should be refined to decrease disease-related morbidity

    Behavioral Model For Live Detection of Apps Based Attack

    Full text link
    Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model

    LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G

    Full text link
    The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.Comment: in IEEE Transactions on Network and Service Management, 202
    • …
    corecore